ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۱۰۵ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Biosecurity challenges of the global expansion of high-containment biological laboratories

    Biosecurity challenges of the global expansion of high-containment biological laboratories

    Alison K Hottes; Ben Rusek; Frances Ellen Sharples; National Academy of Sciences (U.S.). Committee on International Security and Arms Control.; National Academy of Sciences (U.S.). Committee on Anticipating Biosecurity Challenges of the Global Expansion of High-Containment Biological Laboratories, 2012
    PDF
    Jonathan Dean: Pioneer in Détente in Europe, Global Cooperative Security, Arms Control and Disarmament

    Jonathan Dean: Pioneer in Détente in Europe, Global Cooperative Security, Arms Control and Disarmament

    Hans Günter Brauch, Teri Grimwood (eds.), 2014
    PDF
    Postinternationalism and Small Arms Control : Theory, Politics, Security

    Postinternationalism and Small Arms Control : Theory, Politics, Security

    Damien Rogers, 2009
    PDF
    State Control over Private Military and Security Companies in Armed Conflict

    State Control over Private Military and Security Companies in Armed Conflict

    Hannah Tonkin, 2011
    PDF
    Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty

    Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty

    Committee on Technical Issues Related to Ratification of the Comprehensive Nuclear Test Ban Treaty, Committee on International Security and Arms Control, National Academy of Sciences, 2002
    PDF
    Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty

    Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty

    Committee on Technical Issues Related to Ratification of the Comprehensive Nuclear Test Ban Treaty, Committee on International Security and Arms Control, National Academy of Sciences, 2002
    PDF
    The Spent-Fuel Standard for Disposition of Excess Weapon Plutonium

    The Spent-Fuel Standard for Disposition of Excess Weapon Plutonium

    Panel to Review the Spent-Fuel Standard for Disposition of Excess Weapon Plutonium, Committee on International Security and Arms Control, National Academy of Sciences, 2000
    PDF
    Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings

    Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings

    Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.), 2001
    PDF
    Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings

    Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21–23, 2001 Proceedings

    Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.), 2001
    PDF
    Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings

    Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings

    José Ma Saldaña, José I. Aznar, Eduardo Viruete, Julián Fernández-Navajas, José Ruiz (auth.), Novella Bartolini, Sotiris Nikoletseas, Prasun Sinha, Valeria Cardellini, Anirban Mahanti (eds.), 2009
    PDF
    RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)

    RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)

    Yan Zhang, Laurence T. Yang, Jiming Chen, 2009
    PDF
    Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications

    Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications

    Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
    PDF
    Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications

    Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications

    Yan Zhang, Laurence T. Yang, Jianhua Ma, 2008
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Cyber-War: The Anatomy of the global Security Threat

    Cyber-War: The Anatomy of the global Security Threat

    Julian Richards (auth.), 2014
    PDF
    Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures

    Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures

    Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
    PDF
    Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures

    Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures

    Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
    PDF
    Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures

    Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures

    Santiago Escobar, Catherine Meadows, José Meseguer (auth.), Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.), 2009
    PDF
    Black Hat Physical Device Security: Exploiting Hardware and Software

    Black Hat Physical Device Security: Exploiting Hardware and Software

    Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services, 2005
    DJVU
    Secure Internet Programming: Security Issues for Mobile and Distributed Objects

    Secure Internet Programming: Security Issues for Mobile and Distributed Objects

    Vipin Swarup, Javier Thayer Fábrega (auth.), Jan Vitek, Christian D. Jensen (eds.), 1999
    PDF
    Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings

    Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings

    Sjouke Mauw, Christian Damsgaard Jensen (eds.), 2014
    PDF
    Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

    Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

    Marcin Czenko, Jeroen Doumen, Sandro Etalle (auth.), Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen (eds.), 2008
    PDF
    Certification and Security in E-Services: From E-Government to E-Business

    Certification and Security in E-Services: From E-Government to E-Business

    Maurizio Talamo (auth.), Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo (eds.), 2003
    PDF
    Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (IFIP International Federation for Information Processing)

    Certification and Security in Inter-Organizational E-Services: IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (IFIP International Federation for Information Processing)

    Enrico Nardelli, Maurizio Talamo, 2005
    PDF
    Basic Security Testing with Kali Linux

    Basic Security Testing with Kali Linux

    Daniel W. Dieterle, 2013
    |< ۱۰۰ ۱۰۱ ۱۰۲ ۱۰۳ ۱۰۴ ۱۰۵ ۱۰۶ ۱۰۷ ۱۰۸ ۱۰۹ ۱۱۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.