ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

کتاب های Eds.

کتاب های نویسنده
صفحه ۳۶۲ از ۱,۵۵۸ در بین ۳۸,۹۳۱ کتاب.
    PDF
    Methods, Models and Tools for Fault Tolerance

    Methods, Models and Tools for Fault Tolerance

    A. Fehnker, M. Fruth, A. K. McIver (auth.), Michael Butler, Cliff Jones, Alexander Romanovsky, Elena Troubitsyna (eds.), 2009
    PDF
    Rigorous Development of Complex Fault-Tolerant Systems

    Rigorous Development of Complex Fault-Tolerant Systems

    Jean-Raymond Abrial (auth.), Michael Butler, Cliff B. Jones, Alexander Romanovsky, Elena Troubitsyna (eds.), 2006
    PDF
    Software Diversity in Computerized Control Systems

    Software Diversity in Computerized Control Systems

    Dipl.-Math. Udo Voges (auth.), Dipl.-Math. Udo Voges (eds.), 1988
    PDF
    Software Fault Tolerance: Achievement and Assessment Strategies

    Software Fault Tolerance: Achievement and Assessment Strategies

    Manfred Kersken (auth.), Manfred Kersken, Francesca Saglietti (eds.), 1992
    EPUB
    Applied Social Psychology: Understanding and Addressing Social and Practical Problems

    Applied Social Psychology: Understanding and Addressing Social and Practical Problems

    Frank W. Schneider, Jamie A. Gruman, Larry M Coutts (eds.)
    PDF
    Assessing Change in Psychoanalytic Psychotherapy of Children and Adolescents: Today’s Challenge

    Assessing Change in Psychoanalytic Psychotherapy of Children and Adolescents: Today’s Challenge

    John Tsiantis, Judith Trowell (eds.), 2010
    PDF
    Art in the Anthropocene: Encounters among Aesthetics, Politics, Environments and Epistemologies

    Art in the Anthropocene: Encounters among Aesthetics, Politics, Environments and Epistemologies

    Heather Davis, Etienne Turpin (eds.), 2015
    PDF
    Bats in the Anthropocene: Conservation of Bats in a Changing World

    Bats in the Anthropocene: Conservation of Bats in a Changing World

    Christian C. Voigt, Tigga Kingston (eds.), 2016
    PDF
    Coral Reefs in the Anthropocene

    Coral Reefs in the Anthropocene

    Charles Birkeland (eds.), 2015
    PDF
    Earth System Science in the Anthropocene

    Earth System Science in the Anthropocene

    Wolfram Mauser (auth.), Professor Dr. Eckart Ehlers, Dr. Thomas Krafft (eds.), 2006
    PDF
    Earth System Science in the Anthropocene: Emerging Issues and Problems

    Earth System Science in the Anthropocene: Emerging Issues and Problems

    Eckart Ehlers, Thomas Krafft (Eds.), 2006
    PDF
    Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings

    Advances in Cryptology - EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings

    Michael J. Freedman, Kobbi Nissim, Benny Pinkas (auth.), Christian Cachin, Jan L. Camenisch (eds.), 2004
    PDF
    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

    Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

    Mihir Bellare, Dennis Hofheinz, Scott Yilek (auth.), Antoine Joux (eds.), 2009
    PDF
    Advances in Cryptology -- EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I

    Advances in Cryptology -- EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I

    Elisabeth Oswald, Marc Fischlin (eds.), 2015
    PDF
    Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings

    Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings

    Vadim Lyubashevsky, Chris Peikert, Oded Regev (auth.), Henri Gilbert (eds.), 2010
    PDF
    Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings

    Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings

    Vadim Lyubashevsky, Chris Peikert, Oded Regev (auth.), Henri Gilbert (eds.), 2010
    PDF
    Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings

    Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings

    Antoine Joux (auth.), David Pointcheval, Thomas Johansson (eds.), 2012
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings

    Antonio Nappa, M. Zubair Rafique, Juan Caballero (auth.), Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert (eds.), 2013
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings

    Sven Dietrich (eds.), 2014
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

    Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.), 2015
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

    Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez (eds.), 2016
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings

    Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan (auth.), Bernhard M. Hämmerli, Robin Sommer (eds.), 2007
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Sandeep Bhatkar, R. Sekar (auth.), Diego Zamboni (eds.), 2008
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Sandeep Bhatkar, R. Sekar (auth.), Diego Zamboni (eds.), 2008
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

    Youngsang Shin, Steven Myers, Minaxi Gupta (auth.), Ulrich Flegel, Danilo Bruschi (eds.), 2009
    |< ۳۵۷ ۳۵۸ ۳۵۹ ۳۶۰ ۳۶۱ ۳۶۲ ۳۶۳ ۳۶۴ ۳۶۵ ۳۶۶ ۳۶۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.