ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۷۹ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Computational Intelligence for Privacy and Security

    Computational Intelligence for Privacy and Security

    David A. Elizondo, 2012
    CHM
    Computer Forensics and Privacy (Artech House Computer Security Series)

    Computer Forensics and Privacy (Artech House Computer Security Series)

    Michael A. Caloyannides, 2001
    PDF
    Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

    Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

    Ramesh Subramanian, 2008
    PDF
    Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

    Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

    Ramesh Subramanian, 2008
    PDF
    Embedded Liberalism and Its Critics: Justifying Global Governance in the American Century (New Visions in Security)

    Embedded Liberalism and Its Critics: Justifying Global Governance in the American Century (New Visions in Security)

    Jens Steffek, 2006
    PDF
    Developing Strategies to Deal with Trauma in Children (NATO Security Through Science Series. E: Human and Societal)

    Developing Strategies to Deal with Trauma in Children (NATO Security Through Science Series. E: Human and Societal)

    J. Donnelly, 2005
    PDF
    European Security in the 1990s: Deterrence and Defense after the INF Treaty

    European Security in the 1990s: Deterrence and Defense after the INF Treaty

    Walter Laqueur, 1990
    PDF
    Special Report 270 - Deterrence, Protection, and Preparation - The New Transportation Security Imperative

    Special Report 270 - Deterrence, Protection, and Preparation - The New Transportation Security Imperative

    2002
    PDF
    Strengthening Conventional Deterrence in Europe: Proposals for the 1980s

    Strengthening Conventional Deterrence in Europe: Proposals for the 1980s

    European Security Study (auth.), 1983
    PDF
    Defiance: Or How to Succeed in Business Despite Being Hounded by the FBI, the KGB, the INS, the Department of Homeland Security,

    Defiance: Or How to Succeed in Business Despite Being Hounded by the FBI, the KGB, the INS, the Department of Homeland Security,

    Alex Konanykhin, 2006
    PDF
    International Student Security

    International Student Security

    Simon Marginson, 2010
    PDF
    Multimedia and Security Workshop at ACM Multimedia 98. Bristol

    Multimedia and Security Workshop at ACM Multimedia 98. Bristol

    Dittmann, Jana
    PDF
    Open Security: Von den Grundlagen zu den Anwendungen

    Open Security: Von den Grundlagen zu den Anwendungen

    Dr. Stephan Fischer, 1998
    PDF
    Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, ... Computer Science   Security and Cryptology)

    Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, ... Computer Science Security and Cryptology)

    Phong Q. Nguyen, 2010
    PDF
    Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings ... Computer Science   Security and Cryptology)

    Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings ... Computer Science Security and Cryptology)

    Phong Q. Nguyen, 2010
    PDF
    Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

    Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

    Dmitry Korzun, 2013
    PDF
    ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

    ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

    Jaap-Henk Hoepman, 2016
    CHM
    How Personal & Internet Security Work

    How Personal & Internet Security Work

    Preston Gralla, 2006
    EPUB
    Practical embedded security : building secure resource-constrained systems

    Practical embedded security : building secure resource-constrained systems

    Stapko, 2008
    PDF
    Practical embedded security: building secure resource-constrained systems

    Practical embedded security: building secure resource-constrained systems

    Timothy Stapko, 2008
    PDF
    Environmental Security in South-Eastern Europe: International Agreements and Their Implementation

    Environmental Security in South-Eastern Europe: International Agreements and Their Implementation

    Massimiliano Montini, 2011
    PDF
    The United States, China and Southeast Asian Security: A Changing of the Guard?

    The United States, China and Southeast Asian Security: A Changing of the Guard?

    Wayne Bert, 2003
    PDF
    United States, Britain and the Transatlantic Crisis: Rising to the Gaullist Challenge, 1963-68 (Global Conflict and Security since 1945)

    United States, Britain and the Transatlantic Crisis: Rising to the Gaullist Challenge, 1963-68 (Global Conflict and Security since 1945)

    James Ellison, 2007
    PDF
    The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden

    The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden

    Lloyd C. Gardner, 2016
    PDF
    Insider Threats in Cyber Security

    Insider Threats in Cyber Security

    Christian W. Probst, 2010
    |< ۱۷۴ ۱۷۵ ۱۷۶ ۱۷۷ ۱۷۸ ۱۷۹ ۱۸۰ ۱۸۱ ۱۸۲ ۱۸۳ ۱۸۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.