ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

کتاب های Security

کتاب های نویسنده
صفحه ۳ از ۴ در بین ۷۷ کتاب.
    PDF
    Annual Review 2017

    Annual Review 2017

    National Cyber Security Centre, 2017
    PDF
    Cyber Security Incident Management Guide

    Cyber Security Incident Management Guide

    Centre For Cyber Security Belgium, 2015
    PDF
    Prioritization to Prediction. Volume 4: Measuring What Matters in Remediation

    Prioritization to Prediction. Volume 4: Measuring What Matters in Remediation

    Kenna Security, 2019
    PDF
    On Watch : Profiles from the National Security Agency's Past 40 Years

    On Watch : Profiles from the National Security Agency's Past 40 Years

    National Security Agency, 2016
    PDF
    Computer Security Divsion Annual Report 2015

    Computer Security Divsion Annual Report 2015

    Computer Security Divsion NIST, 2016
    PDF
    CIS Microsoft Windows 10 Enterprise (Release 1909) Benchmark

    CIS Microsoft Windows 10 Enterprise (Release 1909) Benchmark

    Center for Internet Security, 2019
    PDF
    Offensive Security OSCP

    Offensive Security OSCP

    Offensive Security, 2020
    PDF
    Untangling The Web: A Guide To Internet Research

    Untangling The Web: A Guide To Internet Research

    National Security Agency (NSA), 2007
    PDF
    C.A.I.R Is Hamas: How the Federal Government Proved that the Council on American-Islamic Relations is a Front for Terrorism (Archival Series, Book 3)

    C.A.I.R Is Hamas: How the Federal Government Proved that the Council on American-Islamic Relations is a Front for Terrorism (Archival Series, Book 3)

    Center for Security Policy, 2016
    PDF
    Shariah in American Courts: The Expanding Incursion of Islamic Law in the U.S. Legal System (Civilization Jihad Reader Series) (Volume 1)

    Shariah in American Courts: The Expanding Incursion of Islamic Law in the U.S. Legal System (Civilization Jihad Reader Series) (Volume 1)

    Center for Security Policy, 2014
    PDF
    Advanced Web Attacks and Exploitation (AWAE)

    Advanced Web Attacks and Exploitation (AWAE)

    Offensive Security, 2020
    EPUB
    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Resource, Cyber Security, 2021
    PDF
    Hack into your Friends Computer

    Hack into your Friends Computer

    Magelan Cyber Security, 2021
    PDF
    Wireless Attacks - WiFu

    Wireless Attacks - WiFu

    Offensive Security, 2012
    PDF
    Offensive Security - BackTrack to the Max Cracking the Perimeter V

    Offensive Security - BackTrack to the Max Cracking the Perimeter V

    Offensive Security, 2008
    PDF
    Reinhard Heydrich's Memorial Book - My Honour is Loyalty

    Reinhard Heydrich's Memorial Book - My Honour is Loyalty

    Reich Security Main Office [Reichssicherheits-Hauptamt], 1942
    EPUB
    CIS Critical Security Controls

    CIS Critical Security Controls

    Center for Internet Security, 2021
    PDF
    Connected Places: cyber security principles.

    Connected Places: cyber security principles.

    National Cyber Security Centre
    EPUB
    The Rise of Russia - the Turning Point for Russian Foreign Policy: Russia's Military Interventions in Ukraine and Syria, Interference With the U.S. Presidential Elections, Engagement With Latin America & Interests in Sub-Saharan Africa

    The Rise of Russia - the Turning Point for Russian Foreign Policy: Russia's Military Interventions in Ukraine and Syria, Interference With the U.S. Presidential Elections, Engagement With Latin America & Interests in Sub-Saharan Africa

    Keir Giles; R. Evan Ellis; Strategic Studies Institute; Department Of Homeland Security; Federal Bureau Of Investigation, 2017
    EPUB
    International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation, 2017
    EPUB
    Social Security Handbook 2014: Overview of Social Security Programs

    Social Security Handbook 2014: Overview of Social Security Programs

    Social Security Administration, 2014
    EPUB
    Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    National Research Council; Division on Engineering and Physical Sciences; Laboratory Assessments Board; Committee on Assessment of the Governance Structure of the NNSA National Security Laboratories, 2015
    EPUB
    Hack into your Friends Computer

    Hack into your Friends Computer

    Magelan Cyber Security
    PDF
    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Institute of Medicine National Academy of Engineering National Academy of Sciences; and Public Policy Engineering Committee on Science; Panel on the Impact of National Security Controls on International Technology Transfer, 1987
    PDF
    Countering Hostile Surveillance: Detect, Evade, and Neutralize Physical Surveillance Threats

    Countering Hostile Surveillance: Detect, Evade, and Neutralize Physical Surveillance Threats

    ACM IV Security Services, 2008
    |< ۱ ۲ ۳ ۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.