ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۱ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security Egham, UK, September 2013, Proceedings

    Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security Egham, UK, September 2013, Proceedings

    Jason Crampton, 2013
    PDF
    Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 - 15, 2004. Proceedings

    Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 - 15, 2004. Proceedings

    Shiping Chen, 2004
    PDF
    Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 - 15, 2004. Proceedings

    Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 - 15, 2004. Proceedings

    Shiping Chen, 2004
    PDF
    Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings

    Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings

    Nicola Zannone, 2006
    PDF
    Security Sector Transformation in Southeastern Europe and the Middle East (Nato Science for Peace and Security Series. Human and Societal Dynamics)

    Security Sector Transformation in Southeastern Europe and the Middle East (Nato Science for Peace and Security Series. Human and Societal Dynamics)

    T. Dokos, 2007
    PDF
    Security Patterns Integrating Security and Systems Engineering

    Security Patterns Integrating Security and Systems Engineering

    Markus Schumacher, 2006
    EPUB
    Security Patterns: Integrating Security and Systems Engineering

    Security Patterns: Integrating Security and Systems Engineering

    Markus Schumacher, 2006
    MOBI
    Security Patterns: Integrating Security and Systems Engineering

    Security Patterns: Integrating Security and Systems Engineering

    Markus Schumacher, 2006
    PDF
    Exposure and Risk Assessment of Chemical Pollution - Contemporary Methodology (NATO Science for Peace and Security Series C: Environmental Security)

    Exposure and Risk Assessment of Chemical Pollution - Contemporary Methodology (NATO Science for Peace and Security Series C: Environmental Security)

    Lubomir I. Simeonov, 2009
    PDF
    Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science   Security and Cryptology)

    Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology)

    Olivier Markowitch, 2009
    PDF
    Legal Aspects of Combating Terrorism: Volume 47 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security ... Sub Series-Human and Societal Dynamics)

    Legal Aspects of Combating Terrorism: Volume 47 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security ... Sub Series-Human and Societal Dynamics)

    Centre of Excellence Defence Against Terrorism, 2008
    PDF
    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

    Douglas Landoll, 2011
    PDF
    Understanding and Responding to Terrorism:  Volume 19 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    Understanding and Responding to Terrorism: Volume 19 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    Huseyin Durmaz, 2007
    PDF
    Scientific Support for the Decision Making in the Security Sector (Nato Science for Peace and Security)

    Scientific Support for the Decision Making in the Security Sector (Nato Science for Peace and Security)

    Ognyan Kounchev, 2007
    PDF
    Transboundary Water Resources: Strategies for Regional Security and Ecological Stability: Proceedings of the NATO Advanced Research Workshop on Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Novosibirsk, Russia 25–27 August, 2003

    Transboundary Water Resources: Strategies for Regional Security and Ecological Stability: Proceedings of the NATO Advanced Research Workshop on Transboundary Water Resources: Strategies for Regional Security and Ecological Stability Novosibirsk, Russia 25–27 August, 2003

    D.H. Smith (auth.), 2005
    PDF
    Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings (Lecture ... Computer Science   Security and Cryptology)

    Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings (Lecture ... Computer Science Security and Cryptology)

    Simone Fischer Hubner, 2009
    PDF
    Safety, security and reliability related computers for the 1990s : Symposium : Selected papers

    Safety, security and reliability related computers for the 1990s : Symposium : Selected papers

    International Federation of Automatic Control.; European Workshop on Industrial Computer Systems. Technical Committee on Safety, Security, 1990
    PDF
    The Rise and Decline of a Global Security Actor: UNHCR, Refugee Protection and Security

    The Rise and Decline of a Global Security Actor: UNHCR, Refugee Protection and Security

    Anne Hammerstad, 2014
    PDF
    HIV and Disability: Updating the Social Security Listings

    HIV and Disability: Updating the Social Security Listings

    Committee on Social Security HIV Disability Criteria, 2003
    PDF
    The United Nations, Peace and Security: From Collective Security to the Responsibility to Protect

    The United Nations, Peace and Security: From Collective Security to the Responsibility to Protect

    Ramesh Thakur, 2006
    PDF
    Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers

    Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers

    Marc Chisinevski (auth.), 2010
    PDF
    Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers

    Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers

    Marc Chisinevski (auth.), 2010
    PDF
    CISSP 100 Success Secrets - Certified Information Systems Security Professional; The Missing Exam Study, Certification Preparation and Security Application Guide

    CISSP 100 Success Secrets - Certified Information Systems Security Professional; The Missing Exam Study, Certification Preparation and Security Application Guide

    Gerard Blokdijk, 2007
    PDF
    Assessment of technologies deployed to improve aviation security.

    Assessment of technologies deployed to improve aviation security.

    Panel on Assessment of Technologies Deployed to Improve Aviation Security, National Materials Advisory Board, Commission on Engineering
    PDF
    Assessment of the Bureau of Reclamation's Security Program

    Assessment of the Bureau of Reclamation's Security Program

    Committee to Assess the Bureau of Reclamation"s Security Program, 2008
    |< ۶ ۷ ۸ ۹ ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.