ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

کتاب های Moti Kfir

کتاب های نویسنده
صفحه ۱ از ۲ در بین ۴۹ کتاب.
    PDF
    Sylvia Rafael: The Life and Death of a Mossad Spy

    Sylvia Rafael: The Life and Death of a Mossad Spy

    Ram Oren, Moti Kfir, Shlomo Gazit (Ret.), 2014
    EPUB
    Makers of Worlds, Readers of Signs

    Makers of Worlds, Readers of Signs

    Kfir Cohen Lustig, 2019
    EPUB
    Crisis Intervention Verbatim

    Crisis Intervention Verbatim

    Nira Kfir, 1989
    PDF
    Advances in Cryptology — CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings

    Advances in Cryptology — CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings

    Sean Murphy, Matthew J.B. Robshaw (auth.), Moti Yung (eds.), 2002
    PDF
    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.), 2005
    PDF
    Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

    Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

    Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.), 2008
    PDF
    Malicious Cryptography: Exposing Cryptovirology

    Malicious Cryptography: Exposing Cryptovirology

    Adam Young, Moti Yung, 2004
    PDF
    Malicious Cryptography: Exposing Cryptovirology

    Malicious Cryptography: Exposing Cryptovirology

    Adam Young, Moti Yung, 2004
    PDF
    Progress in Cryptology – INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings

    Progress in Cryptology – INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings

    Markku-Juhani O. Saarinen (auth.), K. Srinathan, C. Pandu Rangan, Moti Yung (eds.), 2007
    PDF
    Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings

    Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings

    Daniel Bleichenbacher, Alexander May (auth.), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (eds.), 2006
    PDF
    Public Key Cryptography: First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98 Pacifico Yokohama, Japan, February 5–6, 1998 Proceedings

    Public Key Cryptography: First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98 Pacifico Yokohama, Japan, February 5–6, 1998 Proceedings

    Yair Frankel, Moti Yung (auth.), Hideki Imai, Yuliang Zheng (eds.), 1998
    PDF
    Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings

    Applied Cryptography and Network Security: 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings

    Ahren Studer, Chenxi Wang (auth.), Jianying Zhou, Moti Yung, Feng Bao (eds.), 2006
    PDF
    Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

    Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

    Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.), 2007
    PDF
    Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings

    Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16-19, 2003. Proceedings

    Ventzislav Nikov, Svetla Nikova, Bart Preneel (auth.), Jianying Zhou, Moti Yung, Yongfei Han (eds.), 2003
    PDF
    Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings

    Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings

    Michael E. Locasto, Angelos D. Keromytis (auth.), Markus Jakobsson, Moti Yung, Jianying Zhou (eds.), 2004
    PDF
    Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings

    Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings

    Jonathan Katz, Philip MacKenzie, Gelareh Taban (auth.), John Ioannidis, Angelos Keromytis, Moti Yung (eds.), 2005
    PDF
    Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

    Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

    Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
    PDF
    Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

    Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

    Liang Xie, Hui Song, Suncun Zhu (auth.), Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung (eds.), 2008
    PDF
    Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

    Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

    Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
    PDF
    Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

    Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

    Junghyun Nam, Seungjoo Kim, Dongho Won (auth.), Joo-Seok Song, Taekyoung Kwon, Moti Yung (eds.), 2006
    PDF
    Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings

    Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings

    Moti Freiman, Noah Broide, Miriam Natanzon, Einav Nammer, Ofek Shilon, Lior Weizman (auth.), Nadia Magnenat-Thalmann (eds.), 2009
    PDF
    Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings

    Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings

    Moti Freiman, Noah Broide, Miriam Natanzon, Einav Nammer, Ofek Shilon, Lior Weizman (auth.), Nadia Magnenat-Thalmann (eds.), 2009
    PDF
    Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings

    Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings

    Moti Freiman, Noah Broide, Miriam Natanzon, Einav Nammer, Ofek Shilon, Lior Weizman (auth.), Nadia Magnenat-Thalmann (eds.), 2009
    PDF
    Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

    Moti Yung (auth.), 2012
    PDF
    Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

    Moti Yung (auth.), 2012
    ۱ ۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.