ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۱۳۴ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Terrorism and Homeland Security : Perspectives, Thoughts, and Opinions

    Terrorism and Homeland Security : Perspectives, Thoughts, and Opinions

    June, 2010
    PDF
    Terrorism and Homeland Security : Perspectives, Thoughts, and Opinions

    Terrorism and Homeland Security : Perspectives, Thoughts, and Opinions

    June, 2010
    PDF
    Terrorism and Homeland Security: Thinking Strategically About Policy

    Terrorism and Homeland Security: Thinking Strategically About Policy

    Paul Viotti, 2008
    PDF
    Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces

    Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces

    Robert R. Rail, 2010
    PDF
    Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces

    Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces

    Robert R. Rail, 2010
    PDF
    Supply Chain Security: A Comprehensive Approach

    Supply Chain Security: A Comprehensive Approach

    Arthur G. Arway, 2013
    PDF
    The United Nations Security Council and War: The Evolution of Thought and Practice since 1945

    The United Nations Security Council and War: The Evolution of Thought and Practice since 1945

    Vaughan Lowe, 2008
    PDF
    The United Nations Security Council and War: The Evolution of Thought and Practice since 1945

    The United Nations Security Council and War: The Evolution of Thought and Practice since 1945

    Vaughan Lowe, 2010
    RAR
    Statistical Methods in Computer Security

    Statistical Methods in Computer Security

    William W.S. Chen, 2004
    PDF
    Statistical Methods in Computer Security (Statistics:  A Series of Textbooks and Monographs)

    Statistical Methods in Computer Security (Statistics: A Series of Textbooks and Monographs)

    William W.S. Chen, 2005
    PDF
    Software Deployment, Updating, and Patching (Information Security)

    Software Deployment, Updating, and Patching (Information Security)

    Bill Stackpole, 2007
    RAR
    SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

    SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

    Syed A. Ahson, 2008
    PDF
    Workplace Security Essentials. A Guide for Helping Organizations Create Safe Work Environments

    Workplace Security Essentials. A Guide for Helping Organizations Create Safe Work Environments

    Eric N. Smith (Auth.), 2014
    EPUB
    The practice of network security monitoring: understanding incident detection and response

    The practice of network security monitoring: understanding incident detection and response

    Richard Bejtlich, 2013
    PDF
    The practice of network security monitoring: understanding incident detection and response

    The practice of network security monitoring: understanding incident detection and response

    Richard Bejtlich, 2013
    PDF
    The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    Richard Bejtlich, 2013
    PDF
    Transforming Disability into Ability: Policies to Promote Work and Income Security for Disabled People

    Transforming Disability into Ability: Policies to Promote Work and Income Security for Disabled People

    Organisation for Economic Co-Operation, 2003
    PDF
    Urban Water Security: Managing Risks: UNESCO-IHP (Urban Water Series)

    Urban Water Security: Managing Risks: UNESCO-IHP (Urban Water Series)

    Blanca Jimenez Cisneros, 2009
    PDF
    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Angelos D. Keromytis (auth.), 2011
    PDF
    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

    Angelos D. Keromytis (auth.), 2011
    PDF
    Cargo Crime: Security and Theft Prevention

    Cargo Crime: Security and Theft Prevention

    John J Coughlin, 2012
    PDF
    From Police to Security Professional : a Guide to a Successful Career Transition

    From Police to Security Professional : a Guide to a Successful Career Transition

    Michael S D"Angelo, 2015
    PDF
    The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network

    The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network

    Ibrahim AL-MARASHI, 2003
    PDF
    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Bernhard Seliger, 2011
    PDF
    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Towards a Northeast Asian Security Community: Implications for Korea's Growth and Economic Development

    Bernhard Seliger, 2011
    |< ۱۲۹ ۱۳۰ ۱۳۱ ۱۳۲ ۱۳۳ ۱۳۴ ۱۳۵ ۱۳۶ ۱۳۷ ۱۳۸ ۱۳۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.