ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۵ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Remote Sensing of the Atmosphere for Environmental Security: Proceedings of the NATO Advanced Research Workshop on Remote Sensing of the Atmosphere for Environmental Security Rabat, Morocco 16–19 November 2005

    Remote Sensing of the Atmosphere for Environmental Security: Proceedings of the NATO Advanced Research Workshop on Remote Sensing of the Atmosphere for Environmental Security Rabat, Morocco 16–19 November 2005

    Kelly Chance (auth.), 2006
    PDF
    Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

    Intelligence and Security Informatics for International Security: Information Sharing and Data Mining

    Hsinchun Chen, 2006
    DJVU
    Computer Security — ESORICS 94: Third European Symposium on Research in Computer Security Brighton, United Kingdom, November 7–9, 1994 Proceedings

    Computer Security — ESORICS 94: Third European Symposium on Research in Computer Security Brighton, United Kingdom, November 7–9, 1994 Proceedings

    Thomas Beth, 1994
    PDF
    Computer Security — ESORICS 94: Third European Symposium on Research in Computer Security Brighton, United Kingdom, November 7–9, 1994 Proceedings

    Computer Security — ESORICS 94: Third European Symposium on Research in Computer Security Brighton, United Kingdom, November 7–9, 1994 Proceedings

    Thomas Beth, 1994
    PDF
    Europe: Financial Crisis and Security Issues (European Political, Economic, and Security Issues)

    Europe: Financial Crisis and Security Issues (European Political, Economic, and Security Issues)

    Patrick B. Werthers, 2011
    PDF
    Aspects of Network and Information Security (Nato Science for Peace and Security)

    Aspects of Network and Information Security (Nato Science for Peace and Security)

    E. Shahbazian, 2008
    PDF
    Boolean Functions in Cryptology and Information Security (Nato Science for Peace and Security)

    Boolean Functions in Cryptology and Information Security (Nato Science for Peace and Security)

    O.A. Logachev, 2008
    PDF
    Information Security, Coding Theory and Related Combinatorics:  Information Coding and Combinatorics - Volume 29 NATO Science for Peace and Security Series

    Information Security, Coding Theory and Related Combinatorics: Information Coding and Combinatorics - Volume 29 NATO Science for Peace and Security Series

    D. Crnkovic, 2011
    PDF
    ITIL-Security-Management realisieren : IT-Service Security-Management nach ITIL - so gehen Sie vor

    ITIL-Security-Management realisieren : IT-Service Security-Management nach ITIL - so gehen Sie vor

    Jochen Brunnstein, 2006
    PDF
    Culture and Security: Symbolic Power and the Politics of International Security

    Culture and Security: Symbolic Power and the Politics of International Security

    Michael C. Williams, 2005
    PDF
    Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security)

    Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security)

    B. Ganor, 2007
    PDF
    Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

    Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

    Kurt W. Radtke, 2000
    EPUB
    The Security Agencies of the United States. How the CIA, FBI, NSA, and Homeland Security Keep Us Safe

    The Security Agencies of the United States. How the CIA, FBI, NSA, and Homeland Security Keep Us Safe

    Tom Streissguth, 2013
    PDF
    Information security architecture : an integrated approach to security in the organization

    Information security architecture : an integrated approach to security in the organization

    Jan Killmeyer Tudor, 2006
    PDF
    Information Security Architecture: An Integrated Approach to Security in the Organization

    Information Security Architecture: An Integrated Approach to Security in the Organization

    Jan Killmeyer, 2000
    PDF
    Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

    Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

    Jan Killmeyer, 2006
    PDF
    Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA

    Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA

    Sabrina De Capitani di Vimercati, 2004
    PDF
    Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings

    Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings

    Ann Cavoukian (auth.), 2011
    PDF
    From Solidarity to Martial Law: The Polish Crisis of 1980-1981: a Documentary History (National Security Archive Cold War Readers) (National Security Archive Cold War Readers)

    From Solidarity to Martial Law: The Polish Crisis of 1980-1981: a Documentary History (National Security Archive Cold War Readers) (National Security Archive Cold War Readers)

    Andrzej Paczkowski, 2007
    PDF
    Optical Imaging Sensors and Systems for Homeland Security Applications (Advanced Sciences and Technologies for Security Applications)

    Optical Imaging Sensors and Systems for Homeland Security Applications (Advanced Sciences and Technologies for Security Applications)

    Bahram Javidi, 2010
    PDF
    Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment

    Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment

    Darrell Clifton, 2012
    PDF
    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Jaideep Vaidya (auth.), 2010
    PDF
    Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

    Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

    R. William Johnstone, 2008
    PDF
    International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic)

    International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic)

    J. &, 2007
    PDF
    Private Security Companies: Transforming Politics and Security in the Czech Republic

    Private Security Companies: Transforming Politics and Security in the Czech Republic

    Oldřich Bureš (auth.), 2015
    |< ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.