ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۰ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Multicast and Group Security (Artech House Computer Security Series)

    Multicast and Group Security (Artech House Computer Security Series)

    Thomas Hardjono, 2003
    PDF
    Security for Telecommunications Networks (Advances in Information Security)

    Security for Telecommunications Networks (Advances in Information Security)

    Patrick Traynor, 2008
    PDF
    The Lucent Library of Homeland Security - A Vulnerable America: An Overview of National Security

    The Lucent Library of Homeland Security - A Vulnerable America: An Overview of National Security

    Geoffrey A. Campbell, 2007
    PDF
    Virus Diseases and Crop Biosecurity (NATO Science for Peace and Security Series C: Environmental Security)

    Virus Diseases and Crop Biosecurity (NATO Science for Peace and Security Series C: Environmental Security)

    Ian Cooper, 2006
    PDF
    Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23rd – 24th September 1996

    Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23rd – 24th September 1996

    Patrick Horster (eds.), 1996
    PDF
    Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

    Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

    Roger M. Needham (auth.), 1990
    PDF
    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Gene Tsudik, 2008
    PDF
    Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Roger Dingledine, 2009
    PDF
    Poland - a New Power in Transatlantic Security: A New Power in Transatlantic Security

    Poland - a New Power in Transatlantic Security: A New Power in Transatlantic Security

    David H. Dunn, 2003
    PDF
    SAP Security: SAP Security Essentials

    SAP Security: SAP Security Essentials

    Jim Stewart, 2005
    PDF
    Research Directions in Data and Applications Security XVIII: IFIP TC 11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, Vol. 18

    Research Directions in Data and Applications Security XVIII: IFIP TC 11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, Vol. 18

    Farkas C. (ed), 2004
    PDF
    Security+ guide to network security fundamentals

    Security+ guide to network security fundamentals

    Mark D Ciampa, 2009
    PDF
    Security+ guide to network security fundamentals

    Security+ guide to network security fundamentals

    Mark D Ciampa, 2009
    PDF
    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Li-Chiou Chen, 2004
    PDF
    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Li-Chiou Chen, 2004
    PDF
    Integrated security systems design : a complete reference for building enterprise-wide digital security systems

    Integrated security systems design : a complete reference for building enterprise-wide digital security systems

    Thomas L Norman, 2015
    PDF
    Computers, Business, and Security. The New Role for Security

    Computers, Business, and Security. The New Role for Security

    James A Schweitzer (Auth.), 1987
    PDF
    Bosnian Security after Dayton: New Perspectives (Contemporary Security Studies)

    Bosnian Security after Dayton: New Perspectives (Contemporary Security Studies)

    Michael Innes, 2006
    PDF
    Bosnian Security after Dayton: New Perspectives (Contemporary Security Studies)

    Bosnian Security after Dayton: New Perspectives (Contemporary Security Studies)

    Michael Innes, 2006
    PDF
    Learning Puppet Security: Secure your IT environments with the powerful security tools of Puppet

    Learning Puppet Security: Secure your IT environments with the powerful security tools of Puppet

    Jason Slagle, 2015
    PDF
    Digital Security: Cyber Terror and Cyber Security (The Digital World)

    Digital Security: Cyber Terror and Cyber Security (The Digital World)

    Ananda Mitra, 2010
    PDF
    Network Security Policies and Procedures (Advances in Information Security)

    Network Security Policies and Procedures (Advances in Information Security)

    Douglas W. Frye
    PDF
    Nanomaterials: Risks and Benefits (NATO Science for Peace and Security Series C: Environmental Security)

    Nanomaterials: Risks and Benefits (NATO Science for Peace and Security Series C: Environmental Security)

    Igor Linkov, 2009
    PDF
    Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)

    Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)

    Claus Vielhauer, 2005
    PDF
    RED HAT LINUX SECURITY AND OPTIMIZATION HUNGRY MINDS =Red Hat Linux Security And Optimization

    RED HAT LINUX SECURITY AND OPTIMIZATION HUNGRY MINDS =Red Hat Linux Security And Optimization

    Mohammed J. Kabir, 2001
    |< ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.