ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۰۲ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Statistical Methods in Computer Security (Statistics:  A Series of Textbooks and Monographs)

    Statistical Methods in Computer Security (Statistics: A Series of Textbooks and Monographs)

    William W.S. Chen, 2005
    PDF
    Software Deployment, Updating, and Patching (Information Security)

    Software Deployment, Updating, and Patching (Information Security)

    Bill Stackpole, 2007
    RAR
    SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

    SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

    Syed A. Ahson, 2008
    PDF
    Workplace Security Essentials. A Guide for Helping Organizations Create Safe Work Environments

    Workplace Security Essentials. A Guide for Helping Organizations Create Safe Work Environments

    Eric N. Smith (Auth.), 2014
    EPUB
    The practice of network security monitoring: understanding incident detection and response

    The practice of network security monitoring: understanding incident detection and response

    Richard Bejtlich, 2013
    PDF
    The practice of network security monitoring: understanding incident detection and response

    The practice of network security monitoring: understanding incident detection and response

    Richard Bejtlich, 2013
    PDF
    The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    Richard Bejtlich, 2013
    PDF
    Transforming Disability into Ability: Policies to Promote Work and Income Security for Disabled People

    Transforming Disability into Ability: Policies to Promote Work and Income Security for Disabled People

    Organisation for Economic Co-Operation, 2003
    PDF
    Urban Water Security: Managing Risks: UNESCO-IHP (Urban Water Series)

    Urban Water Security: Managing Risks: UNESCO-IHP (Urban Water Series)

    Blanca Jimenez Cisneros, 2009
    PDF
    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Angelos D. Keromytis (auth.), 2011
    PDF
    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Angelos D. Keromytis (auth.), 2011
    PDF
    Cargo Crime: Security and Theft Prevention

    Cargo Crime: Security and Theft Prevention

    John J Coughlin, 2012
    PDF
    From Police to Security Professional : a Guide to a Successful Career Transition

    From Police to Security Professional : a Guide to a Successful Career Transition

    Michael S D"Angelo, 2015
    PDF
    The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network

    The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network

    Ibrahim AL-MARASHI, 2003
    PDF
    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Bernhard Seliger, 2011
    PDF
    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Bernhard Seliger, 2011
    PDF
    Decision and Game Theory for Security: 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings

    Decision and Game Theory for Security: 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings

    Emrah Akyol, 2013
    PDF
    Network Security Auditing

    Network Security Auditing

    Chris Jackson, 2009
    PDF
    Defending the U.S. Air Transportation System Against Chemical and Biological Threats

    Defending the U.S. Air Transportation System Against Chemical and Biological Threats

    Committee on Assessment of Security Technologies for Transportation, 2006
    PDF
    Defending the U.S. Air Transportation System Against Chemical and Biological Threats

    Defending the U.S. Air Transportation System Against Chemical and Biological Threats

    Committee on Assessment of Security Technologies for Transportation, 2006
    PDF
    Tuning Priorities in Nuclear Arms Control and Non-Proliferation:  Comparing Approaches of Russia and the West -  Volume 33 NATO Science for Peace and Security ... Series: Human and Societal Dynamics)

    Tuning Priorities in Nuclear Arms Control and Non-Proliferation: Comparing Approaches of Russia and the West - Volume 33 NATO Science for Peace and Security ... Series: Human and Societal Dynamics)

    A. Nikitin, 2008
    CHM
    Improving Web Application Security: Threats and Countermeasures

    Improving Web Application Security: Threats and Countermeasures

    Microsoft Corporation, 2003
    PDF
    Software Systems Reliability and Security

    Software Systems Reliability and Security

    M. Broy, 2007
    PDF
    Microsoft® Windows Server™ 2003 PKI and Certificate Security

    Microsoft® Windows Server™ 2003 PKI and Certificate Security

    Brian Komar, 2004
    PDF
    Strengthening National Public Health Preparedness and Response to Chemical, Biological and Radiological Agent Threats (Nato Security Through Science)

    Strengthening National Public Health Preparedness and Response to Chemical, Biological and Radiological Agent Threats (Nato Security Through Science)

    C. E. Cummings, 2007
    |< ۹۷ ۹۸ ۹۹ ۱۰۰ ۱۰۱ ۱۰۲ ۱۰۳ ۱۰۴ ۱۰۵ ۱۰۶ ۱۰۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.