ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۳ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

    W. Krag BrotbyCISM, 2009
    PDF
    ISO/IEC 27004:2009, Information technology - Security techniques - Information security management - Measurement

    ISO/IEC 27004:2009, Information technology - Security techniques - Information security management - Measurement

    ISO/IEC/JTC 1/SC 27, 2009
    PDF
    Combinatorial Optimization: Methods and Applications:  Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

    Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

    Chvatal V. (ed.), 2011
    PDF
    Radiation and Environmental Safety in North-West Russia: Use of Impact Assessments and Risk Estimation (NATO Science for Peace and Security Series C: Environmental Security)

    Radiation and Environmental Safety in North-West Russia: Use of Impact Assessments and Risk Estimation (NATO Science for Peace and Security Series C: Environmental Security)

    Per Strand, 2006
    PDF
    Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy)

    Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy)

    Hamid R. Nemati, 2009
    PDF
    Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)

    Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)

    Trent Jaeger, 2008
    PDF
    EISS Yearbook 1980–1981 Part II / Annuaire EISS 1980–1981 Partie II: The social security and the economic crisis Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique Travaux de l’Institut Européen de Sécurité Sociale

    EISS Yearbook 1980–1981 Part II / Annuaire EISS 1980–1981 Partie II: The social security and the economic crisis Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique Travaux de l’Institut Européen de Sécurité Sociale

    Prof. Dr. G. M. J. Veldkamp (auth.), 1982
    PDF
    Labor Markets and Social Security: Wage Costs, Social Security Financing and Labor Market Reforms in Europe

    Labor Markets and Social Security: Wage Costs, Social Security Financing and Labor Market Reforms in Europe

    John T. Addison, 1998
    PDF
    Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web ... (Nato Science for Peace and Security)

    Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web ... (Nato Science for Peace and Security)

    Cecilia S. Gal
    PDF
    Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers

    Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers

    Frances Cleary, 2015
    PDF
    Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers

    Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers

    Frances Cleary, 2014
    PDF
    Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers

    Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers

    Francesco Di Cerbo, 2013
    PDF
    Security for Wireless Sensor Networks (Advances in Information Security)

    Security for Wireless Sensor Networks (Advances in Information Security)

    Donggang Liu, 2006
    PDF
    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

    Pieter Agten, 2012
    PDF
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Raoul Strackx, 2010
    PDF
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Raoul Strackx, 2010
    PDF
    Novel Biotechnologies for Biocontrol Agent Enhancement and Management (NATO Security through Science Series   NATO Security through Science Series A: Chemistry and Biology)

    Novel Biotechnologies for Biocontrol Agent Enhancement and Management (NATO Security through Science Series NATO Security through Science Series A: Chemistry and Biology)

    Maurizio Vurro (Editor), 2007
    PDF
    Security leader insights for risk management : lessons and strategies from leading security professionals

    Security leader insights for risk management : lessons and strategies from leading security professionals

    Richard E Chase, 2014
    PDF
    Mapping Transatlantic Security Relations: The EU, Canada and the War on Terror (Routledge Studies in Liberty and Security)

    Mapping Transatlantic Security Relations: The EU, Canada and the War on Terror (Routledge Studies in Liberty and Security)

    Mark B. Salter, 2010
    PDF
    Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)

    Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)

    Wenke Lee, 2010
    PDF
    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Kenneth J. Knapp, 2009
    PDF
    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Kenneth J. Knapp, 2009
    PDF
    Building a Home Security System with Raspberry Pi: Build your own sophisticated modular home security system using the popular Raspberry Pi board

    Building a Home Security System with Raspberry Pi: Build your own sophisticated modular home security system using the popular Raspberry Pi board

    Matthew Poole, 2015
    PDF
    Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World

    Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World

    Security,
    PDF
    English-Chinese, Chinese-English Nuclear Security Glossary

    English-Chinese, Chinese-English Nuclear Security Glossary

    Committee on the U.S.-Chinese Glossary of Nuclear Security Terms, 2008
    |< ۸ ۹ ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.