ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۲ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    International Security vol.2: The Transition to the Post-Cold War Security Agenda

    International Security vol.2: The Transition to the Post-Cold War Security Agenda

    Professor Barry Buzan, 2007
    PDF
    International Security vol.3:Widening Security

    International Security vol.3:Widening Security

    Professor Barry Buzan, 2007
    PDF
    International Security vol.4: Debating Security and Strategy and the Impact of 9-1 1

    International Security vol.4: Debating Security and Strategy and the Impact of 9-1 1

    Professor Barry Buzan, 2007
    PDF
    Social Security Administration Electronic Service Provision: A Strategic Assessment

    Social Security Administration Electronic Service Provision: A Strategic Assessment

    Committee on the Social Security Administration"s E-Government Strategy, 2007
    PDF
    Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy

    Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy

    James Doyle, 2008
    PDF
    New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa

    New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa

    John Haggerty, 2007
    PDF
    Pro PHP security : from application security principles to the implementation of XSS defenses

    Pro PHP security : from application security principles to the implementation of XSS defenses

    Chris Snyder
    PDF
    Pro PHP Security, 2nd Edition: From Application Security Principles to the Implementation of XSS Defenses

    Pro PHP Security, 2nd Edition: From Application Security Principles to the Implementation of XSS Defenses

    Chris Snyder, 2010
    PDF
    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

    Chris Snyder, 2010
    PDF
    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition

    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition

    Chris Snyder, 2010
    PDF
    Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Css Studies in Security and International Relations)

    Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Css Studies in Security and International Relations)

    Myriam Dunn Cavelty, 2007
    PDF
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    DJVU
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-2

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-2

    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-3

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-3

    PDF
    Security+ Guide to Network Security Fundamentals, 4th ed.

    Security+ Guide to Network Security Fundamentals, 4th ed.

    Mark Ciampa, 2012
    PDF
    Crime Prevention, Security and Community Safety Using the 5Is Framework (Crime Prevention and Security Management)

    Crime Prevention, Security and Community Safety Using the 5Is Framework (Crime Prevention and Security Management)

    Paul Ekblom, 2010
    PDF
    The Governance of Policing and Security: Ironies, Myths and Paradoxes (Crime Prevention and Security Management)

    The Governance of Policing and Security: Ironies, Myths and Paradoxes (Crime Prevention and Security Management)

    Bob Hoogenboom, 2010
    PDF
    The Politics of Private Security: Regulation, Reform and Re-Legitimation (Crime Prevention and Security Management)

    The Politics of Private Security: Regulation, Reform and Re-Legitimation (Crime Prevention and Security Management)

    Adam White, 2010
    PDF
    A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)

    A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)

    Sandra Jean Maclean, 2006
    PDF
    America, the EU and Strategic Culture: Transatlantic Security Relations after the Cold War (Contemporary Security Studies)

    America, the EU and Strategic Culture: Transatlantic Security Relations after the Cold War (Contemporary Security Studies)

    Asle Toje, 2008
    PDF
    Communications and Multimedia Security: Proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on communications and multimedia security, 1995

    Communications and Multimedia Security: Proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on communications and multimedia security, 1995

    Reinhard Posch (eds.), 1995
    PDF
    Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

    Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

    Saif ur Rehman, 2010
    EPUB
    The Art of Software Security Testing: Identifying Software Security Flaws

    The Art of Software Security Testing: Identifying Software Security Flaws

    Chris Wysopal, 2006
    |< ۷ ۸ ۹ ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.