ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۶ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Harbour Protection Through Data Fusion Technologies (NATO Science for Peace and Security Series C: Environmental Security)

    Harbour Protection Through Data Fusion Technologies (NATO Science for Peace and Security Series C: Environmental Security)

    Elisa Shahbazian, 2008
    PDF
    Maximum Windows 2000 Security (Maximum Security)

    Maximum Windows 2000 Security (Maximum Security)

    Anonymous, 2001
    PDF
    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

    Simone Fischer-Hübner (eds.), 2001
    PDF
    Nanotechnology - Toxicological Issues and Environmental Safety (NATO Science for Peace and Security Series C: Environmental Security)

    Nanotechnology - Toxicological Issues and Environmental Safety (NATO Science for Peace and Security Series C: Environmental Security)

    Simeonova P.P. (Editor), 2007
    PDF
    Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Volume 11 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Volume 11 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    J. Victoroff, 2006
    PDF
    JavaScript Security: Learn JavaScript security to make your web applications more secure

    JavaScript Security: Learn JavaScript security to make your web applications more secure

    Y.E Liang, 2014
    PDF
    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Dieter Gollmann, 2006
    PDF
    Building Terrorism Resistant Communities:  Together Against Terrorism, Volume 55 NATO Science for Peace and Security Series - E: Human and Societal Dynamics ... Security, E: Human and Societal Dynamics)

    Building Terrorism Resistant Communities: Together Against Terrorism, Volume 55 NATO Science for Peace and Security Series - E: Human and Societal Dynamics ... Security, E: Human and Societal Dynamics)

    S. Ekici, 2009
    PDF
    Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings

    Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings

    Steven Latré, 2015
    PDF
    European Security, Terrorism and Intelligence: Tackling New Security Challenges in Europe

    European Security, Terrorism and Intelligence: Tackling New Security Challenges in Europe

    Christian Kaunert, 2013
    PDF
    Security, Strategy, and Critical Theory (Critical Security Studies)

    Security, Strategy, and Critical Theory (Critical Security Studies)

    Richard Jones, 1999
    PDF
    Security Software Development: Assessing and Managing Security Risks

    Security Software Development: Assessing and Managing Security Risks

    Douglas A. AshbaughCISSP, 2008
    DJVU
    Local Area Network Security: Workshop LANSEC '89 European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3–6, 1989 Proceedings

    Local Area Network Security: Workshop LANSEC '89 European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3–6, 1989 Proceedings

    Kimberly E. Kirkpatrick (auth.), 1989
    PDF
    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Merje Kuus, 2007
    PDF
    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Merje Kuus, 2007
    PDF
    Security in Ad-hoc and Sensor Networks (Computer and Network Security)

    Security in Ad-hoc and Sensor Networks (Computer and Network Security)

    Raheem Beyah, 2009
    PDF
    Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals

    Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals

    Randy Harrison, 2014
    PDF
    Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

    Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

    Keisuke Tanaka, 2015
    PDF
    Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

    Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

    Maki Yoshida, 2014
    PDF
    Security for business professionals : how to plan, implement, and manage your company's security program

    Security for business professionals : how to plan, implement, and manage your company's security program

    Bradley A Wayland, 2014
    PDF
    Safety Related Issues of Spent Nuclear Fuel Storage (NATO Science for Peace and Security Series C: Environmental Security)

    Safety Related Issues of Spent Nuclear Fuel Storage (NATO Science for Peace and Security Series C: Environmental Security)

    J.D.B. Lambert, 2007
    PDF
    Embedded Java Security Security for Mobile Devices

    Embedded Java Security Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Embedded Java Security Security for Mobile Devices

    Embedded Java Security Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Embedded Java Security Security for Mobile Devices

    Embedded Java Security Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Safety and Security Engineering VI. Sixth International Conference on Safety and Security Engineering

    Safety and Security Engineering VI. Sixth International Conference on Safety and Security Engineering

    Brebbia, 2015
    |< ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.