ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۸ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    In Larger Freedom: Towards Development, Security And Human Rights for All - Report of the Secretary-general: Towards Development, Security And Human Rights for All

    In Larger Freedom: Towards Development, Security And Human Rights for All - Report of the Secretary-general: Towards Development, Security And Human Rights for All

    United Nations, 2005
    PDF
    Problems of High Altitude Medicine and Biology (NATO Science for Peace and Security Series   NATO Science for Peace and Security Series A: Chemistry and Biology)

    Problems of High Altitude Medicine and Biology (NATO Science for Peace and Security Series NATO Science for Peace and Security Series A: Chemistry and Biology)

    Almaz Aldashev, 2007
    PDF
    North Korea and Regional Security in the Kim Jong-un Era: A New International Security Dilemma

    North Korea and Regional Security in the Kim Jong-un Era: A New International Security Dilemma

    Bruce E. Bechtol Jr. (auth.), 2014
    PDF
    Examinsight for Internet Security and Acceleration (ISA) Server 2000 Enterprise Edition: Examination 70-227, Installing Configuring, and Administering Microsoft Internet Security and Acceleration Server 2000, Enterprise Edition

    Examinsight for Internet Security and Acceleration (ISA) Server 2000 Enterprise Edition: Examination 70-227, Installing Configuring, and Administering Microsoft Internet Security and Acceleration Server 2000, Enterprise Edition

    Michael Chak Tin Yu
    PDF
    Extreme Man-Made and Natural Hazards in Dynamics of Structures (NATO Science for Peace and Security Series C: Environmental Security)

    Extreme Man-Made and Natural Hazards in Dynamics of Structures (NATO Science for Peace and Security Series C: Environmental Security)

    Adnan Ibrahimbegovic, 2007
    PDF
    Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security

    Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security

    Hisham Al-Assam, 2012
    PDF
    Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security

    Transactions on Data Hiding and Multimedia Security VIII: Special Issue on Pattern Recognition for IT Security

    Hisham Al-Assam, 2012
    PDF
    Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

    Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

    Mark Talabis, 2014
    PDF
    Non-military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Non-military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Peter Chalk, 2000
    PDF
    Non-Military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Non-Military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Peter Chalk (auth.), 2000
    PDF
    Nuclear Security Culture: From National Best Practices to International Standards - Volume 28 NATO Science for Peace and Security Series: Human and Societal Dynamics

    Nuclear Security Culture: From National Best Practices to International Standards - Volume 28 NATO Science for Peace and Security Series: Human and Societal Dynamics

    Igor Khripunov, 2007
    PDF
    The Dynamics of Disability: Measuring and Monitoring Disability for Social Security Programs

    The Dynamics of Disability: Measuring and Monitoring Disability for Social Security Programs

    Committee to Review the Social Security Administration"s Disability Decision Process Research, 2002
    PDF
    Buying Defence and Security in Europe: The EU Defence and Security Procurement Directive in Context

    Buying Defence and Security in Europe: The EU Defence and Security Procurement Directive in Context

    Martin Trybus, 2014
    CHM
    Windows Server 2003 Security Cookbook: Security Solutions and Scripts for System Administrators (Cookbooks (O'Reilly))

    Windows Server 2003 Security Cookbook: Security Solutions and Scripts for System Administrators (Cookbooks (O'Reilly))

    Mike Danseglio, 2005
    PDF
    Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

    Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

    Nashad A. Safa, 2011
    PDF
    Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

    Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

    Nashad A. Safa, 2011
    CHM
    Windows Server 2003 Security Infrastructures: Core Security Features of Windows.NET

    Windows Server 2003 Security Infrastructures: Core Security Features of Windows.NET

    Jan De Clercq, 2004
    PDF
    Security Leader Insights for Information Protection. Lessons and Strategies from Leading Security Professionals

    Security Leader Insights for Information Protection. Lessons and Strategies from Leading Security Professionals

    Bob Fahy, 2014
    PDF
    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings

    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings

    Joachim Biskup, 2007
    PDF
    The social security and the economic crisis II Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique II Travaux de l’Institut Européen de Sécurité Sociale

    The social security and the economic crisis II Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique II Travaux de l’Institut Européen de Sécurité Sociale

    Prof. Dr. Gérard Veldkamp (auth.), 1984
    PDF
    Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

    Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

    Michael Backes, 2002
    PDF
    Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

    Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

    Michael Backes, 2002
    PDF
    Der IT Security Manager: Aktuelles Praxiswissen für IT Security Manager und IT-Sicherheitsbeauftragte in Unternehmen und Behörden

    Der IT Security Manager: Aktuelles Praxiswissen für IT Security Manager und IT-Sicherheitsbeauftragte in Unternehmen und Behörden

    Heinrich Kersten, 2012
    PDF
    Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

    Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

    Thorsten Holz, 2009
    PDF
    Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

    Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

    Thorsten Holz, 2009
    |< ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.