ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۱۷ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Sushil Jajodia, Duminda Wijesekera (auth.), Martin S. Olivier, David L. Spooner (eds.), 2002
    PDF
    Database and Applications Security: Integrating Information Security and Data Management

    Database and Applications Security: Integrating Information Security and Data Management

    Bhavani Thuraisingham, 2005
    PDF
    Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

    Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

    Ron Ben-Natan, 2005
    PDF
    Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

    Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

    Josh Shaul, Aaron Ingram, 2007
    PDF
    Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

    Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

    Peng Liu, Sushil Jajodia, Catherine D. McCollum (auth.), Vijay Atluri, John Hale (eds.), 2000
    PDF
    Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

    Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

    Masaya Sato, Toshihiro Yamauchi (auth.), Kazuo Sakiyama, Masayuki Terada (eds.), 2013
    PDF
    Western Balkans Security Observer Vol 5 No. 18 - Ten Years of Security Sector Reform in Serbia

    Western Balkans Security Observer Vol 5 No. 18 - Ten Years of Security Sector Reform in Serbia

    Marko Zilovic, Miroslav Hadzic, Sonja Stojanovic, Filip Ejdus (eds.), 2010
    PDF
    Mergers and Acquisitions Security: Corporate Restructuring and Security Management

    Mergers and Acquisitions Security: Corporate Restructuring and Security Management

    Edward Halibozek MBA, Gerald L. Kovacich CFECPPCISSP, 2005
    PDF
    Afghanistan, Arms and Conflict: Armed Groups, Disarmament and Security in a Post-war Society (Contemporary Security Studies)

    Afghanistan, Arms and Conflict: Armed Groups, Disarmament and Security in a Post-war Society (Contemporary Security Studies)

    Michael Vinay Bhatia, Mark Sedra, 2008
    PDF
    Testing Web Security: Assessing the Security of Web Sites and Applications

    Testing Web Security: Assessing the Security of Web Sites and Applications

    Steven Splaine, 2002
    PDF
    Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

    Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

    Klaus-Peter Fischer-Hellmann (auth.), Rainer Bischoff (eds.), 2012
    PDF
    Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop

    Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop

    Joint Committees on the Future of the Nuclear Security Environment in 2015, Russian Academy of Sciences, National Research Council, 2009
    PDF
    Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure

    Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure

    Eric D. Knapp and Raj Samani (Auth.), 2013
    PDF
    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Eric D. Knapp, Raj Samani, 2013
    EPUB
    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Eric D. Knapp, Raj Samani, 2013
    PDF
    Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

    Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

    Gilbert N Sorebo; Michael C Echols, 2011
    PDF
    Advanced Water Supply and Wastewater Treatment: A Road to Safer Society and Environment (NATO Science for Peace and Security Series C: Environmental Security)

    Advanced Water Supply and Wastewater Treatment: A Road to Safer Society and Environment (NATO Science for Peace and Security Series C: Environmental Security)

    Petr Hlavinek, Igor Winkler, Jiri Marsalek, Ivana Mahrikova, 2011
    PDF
    Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

    Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

    Ladjel Bellatreche, 2006
    PDF
    China, the United States and South-East Asia: Contending Perspectives on Politics, Security and Economics (Asian Security Studies)

    China, the United States and South-East Asia: Contending Perspectives on Politics, Security and Economics (Asian Security Studies)

    SheldonSimon, 2007
    PDF
    Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)

    Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)

    Adnan Ibrahimbegovic, Muhamed Zlatar, 2009
    PDF
    Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security

    Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security

    PDF
    Computer Incident Response and Product Security (Networking Technology: Security)

    Computer Incident Response and Product Security (Networking Technology: Security)

    Damir Rajnovic, 2010
    PDF
    Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

    Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

    Catherine Paquet, 2009
    PDF
    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

    Andre Karamanian, Srinivas Tenneti, Francois Dessart, 2011
    |< ۱۲ ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.