ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۰ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    Praphul Chandra, 2005
    DJVU
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    Praphul Chandra, 2005
    PDF
    GSM, UMTS, 802.11 and Ad Hoc Security. Bulletproof Wireless Security

    GSM, UMTS, 802.11 and Ad Hoc Security. Bulletproof Wireless Security

    Chandra, 2005
    PDF
    The Minimum Means of Reprisal: China's Search for Security in the Nuclear Age (American Academy Studies in Global Security)

    The Minimum Means of Reprisal: China's Search for Security in the Nuclear Age (American Academy Studies in Global Security)

    Jeffrey G. Lewis, 2007
    DJVU
    Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

    Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

    Michael Waidner (auth.), 1996
    PDF
    Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

    Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

    Michael Waidner (auth.), 1996
    PDF
    Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings

    Computer Security – ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings

    Ivan Damgård, 2013
    PDF
    Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan ... Federation for Information Processing)

    Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan ... Federation for Information Processing)

    Ryoichi Sasaki, 2005
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Douglas Yeung, 2006
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Douglas Yeung, 2006
    PDF
    Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security)

    Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security)

    Jane Bullock, 2006
    PDF
    Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings

    Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings

    P. Bieber, 2000
    PDF
    Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings

    Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings

    P. Bieber, 2000
    PDF
    Advances in Air Pollution Modeling for Environmental Security: Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8–12 May 2004

    Advances in Air Pollution Modeling for Environmental Security: Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8–12 May 2004

    Artash Aloyan, 2005
    PDF
    Integrated Urban Water Resources Management (NATO Science for Peace and Security Series C: Environmental Security)

    Integrated Urban Water Resources Management (NATO Science for Peace and Security Series C: Environmental Security)

    Petr Hlavinek, 2006
    PDF
    Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China

    Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China

    Kai Rannenberg (auth.), 2000
    PDF
    Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised ... Computer Science / Security and Cryptology)

    Radu Sion, 2010
    PDF
    A Rising China and Security in East Asia: Identity Construction and Security Discourse (Politics in Asia)

    A Rising China and Security in East Asia: Identity Construction and Security Discourse (Politics in Asia)

    Rex Li, 2008
    PDF
    The Socio-Economic Causes and Consequences of Desertification in Central Asia (NATO Science for Peace and Security Series C: Environmental Security)

    The Socio-Economic Causes and Consequences of Desertification in Central Asia (NATO Science for Peace and Security Series C: Environmental Security)

    Roy Behnke, 2008
    PDF
    Core Software Security: Security at the Source

    Core Software Security: Security at the Source

    James Ransome, 2013
    PDF
    Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom

    Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom

    Jan Iwanik, 2005
    PDF
    Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

    Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

    Nathan Clarke, 2009
    PDF
    Radical Islam and International Security: Challenges and Responses (Besa Studies in International Security)

    Radical Islam and International Security: Challenges and Responses (Besa Studies in International Security)

    Efraim Inbar: H, 2008
    PDF
    Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

    Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

    P. Neira, 2008
    PDF
    Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

    Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

    P. Neira, 2008
    |< ۵ ۶ ۷ ۸ ۹ ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.