ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۱۸ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    The Politics of Food: The Global Conflict between Food Security and Food Sovereignty (Praeger Security International)

    The Politics of Food: The Global Conflict between Food Security and Food Sovereignty (Praeger Security International)

    William D. Schanbacher, 2010
    PDF
    Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)

    Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)

    Virginia Koukouliou, Magdalena Ujevic, Otto Premstaller, 2009
    PDF
    Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings

    Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings

    Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl (eds.), 2014
    PDF
    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
    PDF
    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
    PDF
    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

    Steve Barker (auth.), Vijay Atluri (eds.), 2008
    PDF
    GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures

    GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures

    Masoud Kalali, 2010
    PDF
    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

    David R. Miller, Michael Gregg, 2007
    PDF
    Security administrator street smarts: a real world guide to CompTIA Security+ skills

    Security administrator street smarts: a real world guide to CompTIA Security+ skills

    David R. Miller, Michael Gregg, 2007
    EPUB
    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition

    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition

    David R. Miller, Michael Gregg, 2011
    PDF
    Cooperating for Peace and Security: Evolving Institutions and Arrangements in a Context of Changing U.S. Security Policy

    Cooperating for Peace and Security: Evolving Institutions and Arrangements in a Context of Changing U.S. Security Policy

    Bruce D. Jones, Shepard Forman, Richard Gowan (eds.), 2009
    PDF
    European Energy Security: Analysing the EU-Russia Energy Security Regime in Terms of Interdependence Theory

    European Energy Security: Analysing the EU-Russia Energy Security Regime in Terms of Interdependence Theory

    Dr. Nataliya Esakova (auth.), 2012
    PDF
    Drinking Water Security for Engineers, Planners, and Managers. Integrated Water Security Series

    Drinking Water Security for Engineers, Planners, and Managers. Integrated Water Security Series

    Ravi Jain (Eds.), 2014
    PDF
    Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings

    Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings

    Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin (eds.), 2007
    PDF
    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.), 2003
    PDF
    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.), 2003
    PDF
    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
    PDF
    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
    PDF
    Assessing the Threat of Weapons of Mass Destruction:  The Role of Independent Scientists, Volume 61 NATO Science for Peace and Security Series - E: Human ... and Security: E: Human and Social Dynamics)

    Assessing the Threat of Weapons of Mass Destruction: The Role of Independent Scientists, Volume 61 NATO Science for Peace and Security Series - E: Human ... and Security: E: Human and Social Dynamics)

    J.L. Finney and I. Slaus, 2010
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram (ed.), John Viega (ed.), 2009
    PDF
    The myths of security: what the computer security industry doesn't want you to know

    The myths of security: what the computer security industry doesn't want you to know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

    IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

    Tobias Ackermann (auth.), 2013
    |< ۱۳ ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.