ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۷ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict

    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict

    Nicole Deitelhoff, 2010
    PDF
    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict.

    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict.

    Nicole Deitelhoff, 2010
    PDF
    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Bernard Peter Robichau, 2014
    PDF
    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Bernard Peter Robichau (auth.), 2014
    PDF
    Reconstructing Security after Conflict: Security Sector Reform in Sierra Leone

    Reconstructing Security after Conflict: Security Sector Reform in Sierra Leone

    Paul Jackson, 2011
    PDF
    Aviation Security Management (Praeger Security International)

    Aviation Security Management (Praeger Security International)

    Andrew R. Thomas, 2008
    PDF
    Rising to the Challenge: China's Grand Strategy and International Security (Studies in Asian Security)

    Rising to the Challenge: China's Grand Strategy and International Security (Studies in Asian Security)

    Avery Goldstein, 2005
    PDF
    China's War on Terrorism: Counter-Insurgency, Politics and Internal Security (Asian Security Studies)

    China's War on Terrorism: Counter-Insurgency, Politics and Internal Security (Asian Security Studies)

    Martin I. Wayne, 2007
    PDF
    ISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information security management systems auditing

    ISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information security management systems auditing

    2011
    CHM
    Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets

    Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets

    Aspatore Books, 2003
    PDF
    IT Security Governance Guidebook with Security Program Metrics on CD-ROM

    IT Security Governance Guidebook with Security Program Metrics on CD-ROM

    Fred Cohen, 2006
    PDF
    Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

    Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

    Thomas R. Peltier, 2001
    PDF
    Security patterns : integrating security and systems engineering

    Security patterns : integrating security and systems engineering

    Markus Schumacher, 2006
    PDF
    Security Convergence: Managing Enterprise Security Risk

    Security Convergence: Managing Enterprise Security Risk

    Dave Tyson, 2007
    PDF
    Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

    Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

    András Belokosztolszki, 2003
    PDF
    Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings

    Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings

    Hamid Jahankhani, 2015
    PDF
    Principles of Computer Security CompTIA Security+ and Beyond Lab Manual

    Principles of Computer Security CompTIA Security+ and Beyond Lab Manual

    Vincent J. Nestler, 2000
    PDF
    Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

    Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

    Vincent Nestler, 2010
    PDF
    Programmer's Ultimate Security DeskRef: Your programming security encyclopedia

    Programmer's Ultimate Security DeskRef: Your programming security encyclopedia

    James C Foster, 2004
    PDF
    Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Joaquin Garcia-Alfaro, 2015
    PDF
    Radio Frequency Identification System Security:  RFIDsec'11 Asia Workshop Proceedings - Volume 6 Cryptology and Information Security Series

    Radio Frequency Identification System Security: RFIDsec'11 Asia Workshop Proceedings - Volume 6 Cryptology and Information Security Series

    T. Li, 2011
    PDF
    Shadow Force: Private Security Contractors in Iraq (Praeger Security International)

    Shadow Force: Private Security Contractors in Iraq (Praeger Security International)

    David Isenberg, 2008
    PDF
    Computer Security — ESORICS 92: Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings

    Computer Security — ESORICS 92: Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings

    John A Bull, 1992
    PDF
    Computer Security – ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings

    Computer Security – ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings

    Michael P. Collins, 2006
    PDF
    Computer Security – ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings

    Computer Security – ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings

    Michael P. Collins, 2006
    |< ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.