ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۴ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework

    Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework

    Abraham, Ajin, 2015
    PDF
    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Elisa Bertino, 2003
    PDF
    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Elisa Bertino, 2003
    PDF
    Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

    Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

    Lawrence H. Cox (auth.), 2004
    PDF
    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    S. H. (Basie) von Solms (auth.), 2010
    PDF
    Conflict, Security and the Reshaping of Society: The Civilization of War (Routledge studies in liberty and security)

    Conflict, Security and the Reshaping of Society: The Civilization of War (Routledge studies in liberty and security)

    Alessandro Dal Lago, 2010
    PDF
    ISO/IEC 27003:2010, Information technology - Security techniques - Information security management system implementation guidance

    ISO/IEC 27003:2010, Information technology - Security techniques - Information security management system implementation guidance

    ISO/IEC/JTC 1/SC 27, 2010
    PDF
    Becoming a global chief security executive officer : a how to guide for next generation security leaders

    Becoming a global chief security executive officer : a how to guide for next generation security leaders

    Cloutier, 2015
    PDF
    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Bart Preneel (auth.), 2009
    PDF
    Security and Environment in the Mediterranean: Conceptualising Security and Environmental Conflicts

    Security and Environment in the Mediterranean: Conceptualising Security and Environmental Conflicts

    Jonathan Dean (auth.), 2003
    PDF
    The Distributional Aspects of Social Security and Social Security Reform (National Bureau of Economic Research Conference Report)

    The Distributional Aspects of Social Security and Social Security Reform (National Bureau of Economic Research Conference Report)

    Martin Feldstein, 2002
    PDF
    Dangerous Pollutants (Xenobiotics) in Urban Water Cycle (NATO Science for Peace and Security Series C: Environmental Security)

    Dangerous Pollutants (Xenobiotics) in Urban Water Cycle (NATO Science for Peace and Security Series C: Environmental Security)

    Petr Hlavinek, 2007
    PDF
    Management of Intentional and Accidental Water Pollution (NATO Science for Peace and Security Series C: Environmental Security)

    Management of Intentional and Accidental Water Pollution (NATO Science for Peace and Security Series C: Environmental Security)

    Gyula Dura, 2006
    PDF
    Safety, Reliability and Risks Associated with Water, Oil and Gas Pipelines (NATO Science for Peace and Security Series C: Environmental Security)

    Safety, Reliability and Risks Associated with Water, Oil and Gas Pipelines (NATO Science for Peace and Security Series C: Environmental Security)

    Guy Pluvinage, 2007
    PDF
    Water Supply in Emergency Situations (NATO Science for Peace and Security Series C: Environmental Security)

    Water Supply in Emergency Situations (NATO Science for Peace and Security Series C: Environmental Security)

    Yair Sharan, 2007
    PDF
    Water Treatment Technologies for the Removal of High-Toxity Pollutants (NATO Science for Peace and Security Series C: Environmental Security)

    Water Treatment Technologies for the Removal of High-Toxity Pollutants (NATO Science for Peace and Security Series C: Environmental Security)

    Miroslava Václavíková, 2009
    CHM
    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Jothy Rosenberg, 2004
    EPUB
    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Jothy Rosenberg, 2004
    PDF
    Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings

    Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings

    Antoine Amarilli, 2011
    PDF
    Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings

    Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings

    Antoine Amarilli, 2011
    PDF
    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Qing Li, 2015
    PDF
    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Qing Li, 2015
    PDF
    Stem Cells and Their Potential for Clinical Application (NATO Science for Peace and Security Series   NATO Science for Peace and Security Series A: Chemistry and Biology)

    Stem Cells and Their Potential for Clinical Application (NATO Science for Peace and Security Series NATO Science for Peace and Security Series A: Chemistry and Biology)

    Nadja M. Bilko (Editor), 2007
    PDF
    Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

    Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

    Hsinchun Chen Ph.D. (auth.), 2006
    PDF
    Commissions of Inquiry and National Security: Comparative Approaches (Praeger Security International)

    Commissions of Inquiry and National Security: Comparative Approaches (Praeger Security International)

    Stuart Farson, 2010
    |< ۹ ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.