ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۰ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Combinatorial Optimization: Methods and Applications:  Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

    Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

    Chvatal V. (ed.), 2011
    PDF
    Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers

    Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers

    Francesco Di Cerbo, 2013
    PDF
    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

    Pieter Agten, 2012
    PDF
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Raoul Strackx, 2010
    PDF
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Raoul Strackx, 2010
    PDF
    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Kenneth J. Knapp, 2009
    PDF
    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Kenneth J. Knapp, 2009
    PDF
    Information Security, Coding Theory and Related Combinatorics:  Information Coding and Combinatorics - Volume 29 NATO Science for Peace and Security Series

    Information Security, Coding Theory and Related Combinatorics: Information Coding and Combinatorics - Volume 29 NATO Science for Peace and Security Series

    D. Crnkovic, 2011
    PDF
    Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security)

    Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security)

    B. Ganor, 2007
    PDF
    Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA

    Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA

    Sabrina De Capitani di Vimercati, 2004
    PDF
    International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic)

    International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic)

    J. &, 2007
    PDF
    Building Terrorism Resistant Communities:  Together Against Terrorism, Volume 55 NATO Science for Peace and Security Series - E: Human and Societal Dynamics ... Security, E: Human and Societal Dynamics)

    Building Terrorism Resistant Communities: Together Against Terrorism, Volume 55 NATO Science for Peace and Security Series - E: Human and Societal Dynamics ... Security, E: Human and Societal Dynamics)

    S. Ekici, 2009
    PDF
    Examinsight for Internet Security and Acceleration (ISA) Server 2000 Enterprise Edition: Examination 70-227, Installing Configuring, and Administering Microsoft Internet Security and Acceleration Server 2000, Enterprise Edition

    Examinsight for Internet Security and Acceleration (ISA) Server 2000 Enterprise Edition: Examination 70-227, Installing Configuring, and Administering Microsoft Internet Security and Acceleration Server 2000, Enterprise Edition

    Michael Chak Tin Yu
    PDF
    Non-military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Non-military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Peter Chalk, 2000
    PDF
    Non-Military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Non-Military Security and Global Order: The Impact of Extremism, Violence and Chaos on National and International Security

    Peter Chalk (auth.), 2000
    PDF
    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry)

    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry)

    Janusz S. Kowalik, 2005
    PDF
    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Laura Chappell (auth.), 2012
    EPUB
    Mastering Python for networking and security : leverage Python scripts and libraries to overcome networking and security issues

    Mastering Python for networking and security : leverage Python scripts and libraries to overcome networking and security issues

    Manuel Ortega, José, 2018
    PDF
    Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)

    Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)

    Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor), 2020
    PDF
    Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

    Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

    Peter Rising, 2020
    PDF
    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Laura Chappell, 2012
    PDF
    Practical Security Automation and Testing: Tools and techniques for automated security scanning and testing in DevSecOps

    Practical Security Automation and Testing: Tools and techniques for automated security scanning and testing in DevSecOps

    Tony Hsiang-Chih Hsu, 2019
    PDF
    Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)

    Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)

    Reza Montasari (editor), Hamid Jahankhani (editor), Haider Al-Khateeb (editor), 2021
    PDF
    Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900: Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

    Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900: Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

    Dwayne Natwick, 2022
    PDF
    Does an unconditional basic income provide higher effectiveness and efficiency? An Analysis of the social security systems of Germany, Sweden and the United Kingdom: An Analysis of the Social Security Systems of Germany, Sweden and the United Kin...

    Does an unconditional basic income provide higher effectiveness and efficiency? An Analysis of the social security systems of Germany, Sweden and the United Kingdom: An Analysis of the Social Security Systems of Germany, Sweden and the United Kin...

    Wolfgang Müller, 2013
    |< ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.