ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Information، صفحه ۱۱۷ از ۳۷۸ در بین ۹,۴۴۵ کتاب.
    PDF
    Growth and Development of Computer Aided Innovation: Third IFIP WG 5.4 Working Conference, CAI 2009, Harbin, China, August 20-21, 2009, Proceedings (IFIP ... in Information and Communication Technology)

    Growth and Development of Computer Aided Innovation: Third IFIP WG 5.4 Working Conference, CAI 2009, Harbin, China, August 20-21, 2009, Proceedings (IFIP ... in Information and Communication Technology)

    Runhua Tan, 2009
    PDF
    Bifurcation Control: Theory and Applications (Lecture Notes in Control and Information Sciences)

    Bifurcation Control: Theory and Applications (Lecture Notes in Control and Information Sciences)

    Guanrong Chen, 2003
    PDF
    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Serge Vaudenay (auth.), 2005
    PDF
    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

    Dan Boneh (auth.), 2012
    EPUB
    A communications cornucopia: Markle Foundation essays on information policy

    A communications cornucopia: Markle Foundation essays on information policy

    Monroe Edwin Price, 1998
    PDF
    Ancient Rome: A Complete Resource That Helps Kids Learn  About this Fascinating Civilization-Includes  Background Information, a Play, Writing and ... Different subtitle for Back cover Copy only ]

    Ancient Rome: A Complete Resource That Helps Kids Learn About this Fascinating Civilization-Includes Background Information, a Play, Writing and ... Different subtitle for Back cover Copy only ]

    Alexandra Hanson-Harding, 2000
    PDF
    ISSE 2008 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference

    ISSE 2008 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference

    Lenka Fibikova, 2009
    PDF
    Entropy and Information Theory

    Entropy and Information Theory

    Robert M. Gray (auth.), 2011
    PDF
    Experimental Robotics IV: The 4th International Symposium, Stanford, California, June 30 - July 2, 1995 (Lecture Notes in Control and Information Sciences) (v. 4)

    Experimental Robotics IV: The 4th International Symposium, Stanford, California, June 30 - July 2, 1995 (Lecture Notes in Control and Information Sciences) (v. 4)

    Oussama Khatib, 1996
    PDF
    Internet Marketing for Information Technology Companies: Proven Online Techniques That Increase Sales and Profits for Hardware, Software, and Networking Companies

    Internet Marketing for Information Technology Companies: Proven Online Techniques That Increase Sales and Profits for Hardware, Software, and Networking Companies

    Barry Silverstein, 2001
    PDF
    Information and Communications Security: 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings

    Information and Communications Security: 4th International Conference, ICICS 2002 Singapore, December 9–12, 2002 Proceedings

    Jeff S. L. Cheng, 2002
    PDF
    New Directions in Nonlinear Observer Design (Lecture Notes in Control and Information Sciences)

    New Directions in Nonlinear Observer Design (Lecture Notes in Control and Information Sciences)

    Henk Nijmeijer, 1999
    PDF
    iRODS Primer: integrated Rule-Oriented Data System (Synthesis Lectures on Information Concepts, Retrieval, and Services)

    iRODS Primer: integrated Rule-Oriented Data System (Synthesis Lectures on Information Concepts, Retrieval, and Services)

    Arcot Rajasekar, 2010
    PDF
    Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14,

    Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14,

    Bruno Apolloni, 2007
    PDF
    Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14,

    Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14,

    Bruno Apolloni, 2007
    PDF
    Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14, 2007,

    Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14, 2007,

    Bruno Apolloni, 2007
    DJVU
    Advances in Neural Information Procesing Systems 4

    Advances in Neural Information Procesing Systems 4

    John E. Moody, 1992
    PDF
    New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud

    New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud

    Chang-Jie Guo, 2011
    PDF
    Fuzzy Logic and its Applications to Engineering, Information Sciences, and Intelligent Systems

    Fuzzy Logic and its Applications to Engineering, Information Sciences, and Intelligent Systems

    Zhenyuan Wang, 1996
    PDF
    Information Dynamics

    Information Dynamics

    George J. Klir (auth.), 1991
    PDF
    Advances in Information Systems Science: Volume 5

    Advances in Information Systems Science: Volume 5

    P. C. Patton (auth.), 1974
    PDF
    Introduction to Cryptography: Principles and Applications, 2nd Edition (Information Security and Cryptography)

    Introduction to Cryptography: Principles and Applications, 2nd Edition (Information Security and Cryptography)

    Hans Delfs, 2007
    PDF
    Linear Controller Design: Limits of Performance (Prentice Hall Information and System Sciences Series)

    Linear Controller Design: Limits of Performance (Prentice Hall Information and System Sciences Series)

    Stephen P. Boyd, 1991
    PDF
    Education for Librarianship in China (Education of Library and Information Professionals)

    Education for Librarianship in China (Education of Library and Information Professionals)

    Guangwei Wu, 1998
    PDF
    Convergence and Hybrid Information Technology: 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings

    Convergence and Hybrid Information Technology: 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings

    Wook Hyun, 2011
    |< ۱۱۲ ۱۱۳ ۱۱۴ ۱۱۵ ۱۱۶ ۱۱۷ ۱۱۸ ۱۱۹ ۱۲۰ ۱۲۱ ۱۲۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.