ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۱۶ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram, John Viega, 2009
    PDF
    European Union Security Dynamics: In The New National Interest (New Security Challenges Series)

    European Union Security Dynamics: In The New National Interest (New Security Challenges Series)

    Janne Haaland Matlary, 2009
    PDF
    Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop

    Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop

    Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko, 2005
    PDF
    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing)

    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing)

    S. H. (Basie) von Solms (auth.), Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.), 2006
    PDF
    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Ian Piumarta, Alessandro Warth (auth.), Robert Hirschfeld, Kim Rose (eds.), 2010
    PDF
    Software security : building security in

    Software security : building security in

    Gary McGraw, 2006
    CHM
    Software Security: Building Security In

    Software Security: Building Security In

    Gary McGraw, 2006
    PDF
    Software Security: Building Security In

    Software Security: Building Security In

    Gary McGraw, 2006
    PDF
    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
    PDF
    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
    PDF
    Network Control and Engineering for QoS, Security and Mobility II: IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13–15, 2003, Muscat, Oman

    Network Control and Engineering for QoS, Security and Mobility II: IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13–15, 2003, Muscat, Oman

    Abderrahim Benslimane, Omar Moussaoui (auth.), Dominique Gaïti, Guy Pujolle, Ahmed Al-Naamany, Hadj Bourdoucen, Lazhar Khriji (eds.), 2003
    PDF
    Network Control and Engineering for QoS, Security and Mobility, III: IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2–5, 2004, Palma de Mallorca, Spain

    Network Control and Engineering for QoS, Security and Mobility, III: IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8 Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2–5, 2004, Palma de Mallorca, Spain

    Rudy Deca, Omar Cherkaoui, Daniel Puche (auth.), Dominique Gaïti, Sebastià Galmés, Ramon Puigjaner (eds.), 2005
    PDF
    Network Control and Engineering for QoS, Security and Mobility, IV: Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14–18, 2005

    Network Control and Engineering for QoS, Security and Mobility, IV: Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14–18, 2005

    Andrei P. Kirilyuk (auth.), Dominique Gaïti (eds.), 2007
    PDF
    Network Control and Engineering for Qos, Security and Mobility, V: IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chile

    Network Control and Engineering for Qos, Security and Mobility, V: IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20–25, 2006, Santiago, Chile

    Xenia Mountrouidou, Vishwas Puttasubbappa (auth.), Dominique Gaïti (eds.), 2006
    PDF
    Network Control and Engineering for QoS, Security and Mobility: IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23–25, 2002, Paris, France

    Network Control and Engineering for QoS, Security and Mobility: IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23–25, 2002, Paris, France

    L. Ram Gopal, Man Li (auth.), Dominique Gaïti, Nadia Boukhatem (eds.), 2003
    PDF
    Calculated Risks : Highly Radioactive Waste and Homeland Security (Homeland Security)

    Calculated Risks : Highly Radioactive Waste and Homeland Security (Homeland Security)

    Kenneth A. Rogers and Marvin G. Kingsley, 2007
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Sushil Jajodia, Duminda Wijesekera (auth.), Martin S. Olivier, David L. Spooner (eds.), 2002
    PDF
    Database and Applications Security: Integrating Information Security and Data Management

    Database and Applications Security: Integrating Information Security and Data Management

    Bhavani Thuraisingham, 2005
    PDF
    Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

    Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

    Ron Ben-Natan, 2005
    PDF
    Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

    Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

    Josh Shaul, Aaron Ingram, 2007
    PDF
    Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

    Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

    Peng Liu, Sushil Jajodia, Catherine D. McCollum (auth.), Vijay Atluri, John Hale (eds.), 2000
    PDF
    Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

    Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

    Masaya Sato, Toshihiro Yamauchi (auth.), Kazuo Sakiyama, Masayuki Terada (eds.), 2013
    |< ۱۱ ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.