ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۱۲ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    EPUB
    Blue Collar & Proud of It: The All-in-One Resource for Finding Freedom, Financial Success and Security Outside the Cubicle

    Blue Collar & Proud of It: The All-in-One Resource for Finding Freedom, Financial Success and Security Outside the Cubicle

    Joe Lamacchia, 2009
    PDF
    Old-Age Security in Comparative Perspective

    Old-Age Security in Comparative Perspective

    John B. Williamson, 1993
    PDF
    Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II

    Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II

    Palash Sarkar, 2014
    PDF
    Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I

    Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I

    Palash Sarkar, 2014
    PDF
    Advances in Information and Computer Security: 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings

    Advances in Information and Computer Security: 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings

    Minoru Kuribayashi (auth.), 2011
    PDF
    Advances in Information and Computer Security: 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings

    Advances in Information and Computer Security: 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings

    Minoru Kuribayashi (auth.), 2011
    PDF
    Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

    Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

    Hamid R. Nemati, 2010
    DJVU
    Network and Internetwork Security: Principles and Practice

    Network and Internetwork Security: Principles and Practice

    William Stallings, 1994
    PDF
    Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

    Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

    Zhiyun Qian, 2012
    PDF
    Social Policy and Poverty in East Asia: The Role of Social Security

    Social Policy and Poverty in East Asia: The Role of Social Security

    James Midgley, 2009
    PDF
    Game Theoretic Analysis of Congestion, Safety and Security: Networks, Air Traffic and Emergency Departments

    Game Theoretic Analysis of Congestion, Safety and Security: Networks, Air Traffic and Emergency Departments

    Kjell Hausken, 2015
    PDF
    Game Theoretic Analysis of Congestion, Safety and Security: Traffic and Transportation Theory

    Game Theoretic Analysis of Congestion, Safety and Security: Traffic and Transportation Theory

    Kjell Hausken, 2015
    EPUB
    Building a Home Security System with Arduino

    Building a Home Security System with Arduino

    Jorge R. Castro, 2015
    PDF
    Advances in enterprise information technology security

    Advances in enterprise information technology security

    Djamel Khadraoui, 2007
    PDF
    The Lucent Library of Homeland Security - Responding to Attack: The Firefighters and The Police

    The Lucent Library of Homeland Security - Responding to Attack: The Firefighters and The Police

    James D. Torr, 2003
    PDF
    Applications of Information Systems to Homeland Security And Defense

    Applications of Information Systems to Homeland Security And Defense

    Hussein A. Abbass, 2005
    PDF
    Availability, Reliability and Security for Business, Enterprise and Health Information Systems: IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings

    Availability, Reliability and Security for Business, Enterprise and Health Information Systems: IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings

    Jostein Jensen (auth.), 2011
    PDF
    Availability, Reliability, and Security in Information Systems and HCI: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings

    Availability, Reliability, and Security in Information Systems and HCI: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings

    Fabienne Kuhn, 2013
    PDF
    A European Security Architecture after the Cold War: Questions of Legitimacy

    A European Security Architecture after the Cold War: Questions of Legitimacy

    Gülnur Aybet (auth.), 2000
    PDF
    Crime Prevention, Security and Community Safety Using the 5Is Framework

    Crime Prevention, Security and Community Safety Using the 5Is Framework

    Paul Ekblom (auth.), 2011
    PDF
    Doing Security: Critical Reflections and an Agenda for Change

    Doing Security: Critical Reflections and an Agenda for Change

    Mark Button (auth.), 2008
    PDF
    Electronic Security Systems. Better Ways to Crime Prevention

    Electronic Security Systems. Better Ways to Crime Prevention

    Philip Walker (Auth.), 1983
    PDF
    Policing and Security in Practice: Challenges and Achievements

    Policing and Security in Practice: Challenges and Achievements

    Tim Prenzler (eds.), 2012
    PDF
    Safety and Security in Transit Environments: An Interdisciplinary Approach

    Safety and Security in Transit Environments: An Interdisciplinary Approach

    Vania Ceccato, 2015
    PDF
    Surveillance Schools: Security, Discipline and Control in Contemporary Education

    Surveillance Schools: Security, Discipline and Control in Contemporary Education

    Emmeline Taylor (auth.), 2013
    |< ۱۰۷ ۱۰۸ ۱۰۹ ۱۱۰ ۱۱۱ ۱۱۲ ۱۱۳ ۱۱۴ ۱۱۵ ۱۱۶ ۱۱۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.