ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۰ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Asian Security Handbook: Terrorism And The New Security Environment

    Asian Security Handbook: Terrorism And The New Security Environment

    William M. Carpenter, David G. Wiencek, James R. Lilley, 2005
    PDF
    Asian Security Handbook: Terrorism And The New Security Environment (East Gate Book)

    Asian Security Handbook: Terrorism And The New Security Environment (East Gate Book)

    James R. Lilley, William M. Carpenter, David G. Wiencek, 2005
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2015
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Advances in Security Technology. Selected Papers of the Carnahan Conferences on Security Technology 1983–1985

    Advances in Security Technology. Selected Papers of the Carnahan Conferences on Security Technology 1983–1985

    Romine Deming (Eds.), 1987
    PDF
    Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers

    Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers

    Rayne Reid, Johan Van Niekerk (auth.), Ronald C. Dodge Jr., Lynn Futcher (eds.), 2013
    PDF
    The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology

    The information security dictionary : defining the terms that define security for E-business, Internet, information, and wireless technology

    Urs E Gattiker, 2004
    PDF
    The Information Security Dictionary Defining The Terms That Define Security For E-Business, Internet, Information And Wireless Technology

    The Information Security Dictionary Defining The Terms That Define Security For E-Business, Internet, Information And Wireless Technology

    Urs E. Gattiker
    PDF
    Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

    Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

    Chris J. Mitchell, Namhyun Hur (auth.), Borka Jerman-Blažič, Tomaž Klobučar (eds.), 2002
    PDF
    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Robert H. Deng, 2010
    PDF
    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Robert H. Deng, 2010
    PDF
    Advances in Information Security Management & Small Systems Security

    Advances in Information Security Management & Small Systems Security

    Les Labuschagne (auth.), 2001
    PDF
    Management of Weather and Climate Risk in the Energy Industry (NATO Science for Peace and Security Series C: Environmental Security)

    Management of Weather and Climate Risk in the Energy Industry (NATO Science for Peace and Security Series C: Environmental Security)

    Alberto Troccoli, 2009
    PDF
    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers

    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers

    Flemming Nielson, 2011
    PDF
    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers

    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers

    Flemming Nielson, 2011
    PDF
    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers

    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus,March 27-28, 2010. Revised Selected Papers

    Flemming Nielson, 2011
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Vandana P. Janeja, 2005
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Vandana P. Janeja, 2005
    PDF
    China's Security Interests in the 21st Century (Routledgecurzon Security in Asia Series)

    China's Security Interests in the 21st Century (Routledgecurzon Security in Asia Series)

    Russell Ong, 2007
    PDF
    Global Security Governance: Competing perceptions of Security in the 21st century

    Global Security Governance: Competing perceptions of Security in the 21st century

    Emil Kirchner, 2007
    PDF
    Industrial Security: Managing Security in the 21st Century

    Industrial Security: Managing Security in the 21st Century

    David L. Russell, 2015
    PDF
    Nuclear Weapons and Cooperative Security in the 21st Century: The New Disorder (Routledge Global Security Studies)

    Nuclear Weapons and Cooperative Security in the 21st Century: The New Disorder (Routledge Global Security Studies)

    Stephen J. Cimbala, 2009
    PDF
    Russia's Foreign Security Policy in the 21st Century: Putin, Medvedev and Beyond (Contemporary Security Studies)

    Russia's Foreign Security Policy in the 21st Century: Putin, Medvedev and Beyond (Contemporary Security Studies)

    Marcel De Haas, 2010
    PDF
    Global Security and the War on Terror: Elite Power and the Illusion of Control (Contemporary Security Studies)

    Global Security and the War on Terror: Elite Power and the Illusion of Control (Contemporary Security Studies)

    Paul Rogers, 2007
    PDF
    Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium

    Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium

    Hideki Sakurada, 2002
    |< ۱۵ ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.