ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۱۹ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

    Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

    Thorsten Holz, 2009
    PDF
    Future NATO Security: Addressing the Challenges of Evolving Security and Information Sharing Systems and Architectures (NATO Science Series: Science & Technology Policy)

    Future NATO Security: Addressing the Challenges of Evolving Security and Information Sharing Systems and Architectures (NATO Science Series: Science & Technology Policy)

    Martin Edmonds, 2004
    PDF
    International Security and the United States  2 volumes : An Encyclopedia (Praeger Security International)

    International Security and the United States 2 volumes : An Encyclopedia (Praeger Security International)

    Karl DeRouen Jr., 2007
    PDF
    Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

    Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

    Stelios Karanastasis, 1999
    PDF
    Corporate Soldiers and International Security:  The Rise of Private Military Companies (Contemporary Security Studies)

    Corporate Soldiers and International Security: The Rise of Private Military Companies (Contemporary Security Studies)

    Christop Kinsey, 2006
    PDF
    Deterring International Terrorism: US National Security Policy after 9 11 (Contemporary Security Studies)

    Deterring International Terrorism: US National Security Policy after 9 11 (Contemporary Security Studies)

    James Lebovic, 2006
    PDF
    Intra-State Conflict, Governments and Security: Dilemmas of Deterrence and Assurance (Contemporary Security Studies)

    Intra-State Conflict, Governments and Security: Dilemmas of Deterrence and Assurance (Contemporary Security Studies)

    Stephe Saideman, 2008
    PDF
    Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

    Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

    Karl Scheibelhofer (auth.), 2001
    PDF
    Security Science: The Theory and Practice of Security

    Security Science: The Theory and Practice of Security

    Clifton Smith, 2013
    PDF
    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Barbara Simons (auth.), 2005
    PDF
    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Barbara Simons (auth.), 2005
    PDF
    Security Fundamentals for E-Commerce (Artech House Computer Security Series)

    Security Fundamentals for E-Commerce (Artech House Computer Security Series)

    Vesna Hassler, 2002
    PDF
    Increasing Seismic Safety by Combining Engineering Technologies and Seismological Data (NATO Science for Peace and Security Series C: Environmental Security)

    Increasing Seismic Safety by Combining Engineering Technologies and Seismological Data (NATO Science for Peace and Security Series C: Environmental Security)

    Marco Mucciarelli, 2008
    PDF
    Risk analysis, dam safety, dam security, and critical infrastructure management : proceedings of the 3rd International Forum on Risk Analysis, Dam Safety, Dam Security, and Critical Infrastructure Management (3IWRDD-Forum), Valencia, Spain, 17-18 October 2011

    Risk analysis, dam safety, dam security, and critical infrastructure management : proceedings of the 3rd International Forum on Risk Analysis, Dam Safety, Dam Security, and Critical Infrastructure Management (3IWRDD-Forum), Valencia, Spain, 17-18 October 2011

    Ignacio Escuder-Bueno, 2012
    PDF
    Challenges in Radiation Protection and Nuclear Safety Regulation of the Nuclear Legacy (NATO Science for Peace and Security Series C: Environmental Security)

    Challenges in Radiation Protection and Nuclear Safety Regulation of the Nuclear Legacy (NATO Science for Peace and Security Series C: Environmental Security)

    Malgorzata K. Sneve, 2008
    PDF
    Swords and Sustenance: The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security)

    Swords and Sustenance: The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security)

    Robert Legvold, 2004
    PDF
    European Security in the Twenty-First Century: The Challenge of Multipolarity (Contemporary Security Studies)

    European Security in the Twenty-First Century: The Challenge of Multipolarity (Contemporary Security Studies)

    Hyde-Price, 2007
    PDF
    Critique, Security and Power: The Political Limits to Emancipatory Approaches (Routledge Critical Security Studies)

    Critique, Security and Power: The Political Limits to Emancipatory Approaches (Routledge Critical Security Studies)

    Tara McCormack, 2009
    PDF
    Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

    Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

    Cecilia S. Gal, 2009
    PDF
    Computer Security – ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

    Computer Security – ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

    Michael K. Reiter (auth.), 2007
    PDF
    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Maciej Grześkowiak (auth.), 2008
    PDF
    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Maciej Grześkowiak (auth.), 2008
    PDF
    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

    Mirosław Kutyłowski, 2014
    PDF
    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

    Mirosław Kutyłowski, 2014
    PDF
    Multicast and Group Security (Artech House Computer Security Series)

    Multicast and Group Security (Artech House Computer Security Series)

    Thomas Hardjono, 2003
    |< ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.