ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۱۹ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
    PDF
    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
    PDF
    Assessing the Threat of Weapons of Mass Destruction:  The Role of Independent Scientists, Volume 61 NATO Science for Peace and Security Series - E: Human ... and Security: E: Human and Social Dynamics)

    Assessing the Threat of Weapons of Mass Destruction: The Role of Independent Scientists, Volume 61 NATO Science for Peace and Security Series - E: Human ... and Security: E: Human and Social Dynamics)

    J.L. Finney and I. Slaus, 2010
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram (ed.), John Viega (ed.), 2009
    PDF
    The myths of security: what the computer security industry doesn't want you to know

    The myths of security: what the computer security industry doesn't want you to know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

    IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

    Tobias Ackermann (auth.), 2013
    PDF
    Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security

    Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security

    John Mueller, Mark G. Stewart, 2011
    PDF
    Ethics, Technology and the American Way of War: Cruise Missiles and US Security Policy (Contemporary Security Studies)

    Ethics, Technology and the American Way of War: Cruise Missiles and US Security Policy (Contemporary Security Studies)

    Reuben E. Brigety II, 2007
    PDF
    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
    PDF
    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
    PDF
    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)

    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)

    Igor Kotenko, Victor Skormin, 2010
    PDF
    Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

    Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

    Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.), 2012
    PDF
    Himalayan Glaciers: Climate Change, Water Resources, and Water Security

    Himalayan Glaciers: Climate Change, Water Resources, and Water Security

    Hydrology, Climate Change, and Implications for Water Security Committee on Himalayan Glaciers, Board on Atmospheric Studies and Climate, Division on Earth and Life Studies, National Research Council, 2012
    PDF
    Computer Security — ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings

    Computer Security — ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings

    Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi (auth.), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (eds.), 1998
    PDF
    Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings

    Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings

    Kun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.), 2013
    PDF
    Physical and logical security convergence: powered by enterprise security management

    Physical and logical security convergence: powered by enterprise security management

    Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole, 2007
    PDF
    Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems

    Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems

    Michael Khairallah, 2005
    PDF
    Physical-layer security : from information theory to security engineering

    Physical-layer security : from information theory to security engineering

    Matthieu Bloch; Joao Barros, 2011
    PDF
    Physical-Layer Security: From Information Theory to Security Engineering

    Physical-Layer Security: From Information Theory to Security Engineering

    Matthieu Bloch, João Barros, 2011
    PDF
    Physical-Layer Security: From Information Theory to Security Engineering

    Physical-Layer Security: From Information Theory to Security Engineering

    Matthieu Bloch, João Barros, 2011
    PDF
    Security Risk Assessment: Managing Physical and Operational Security

    Security Risk Assessment: Managing Physical and Operational Security

    John M. White, 2014
    PDF
    Large-Scale V as a Potential Source of Terrorist Activities:  Importance of Regaining Security in Post-Conflict Societies - Volume 13 NATO ... (Nato Security Through Science Series)

    Large-Scale V as a Potential Source of Terrorist Activities: Importance of Regaining Security in Post-Conflict Societies - Volume 13 NATO ... (Nato Security Through Science Series)

    U. Ewald and K. Turkovic; Editors, 2006
    |< ۱۴ ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.