ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۱ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies [True PDF] [Team-IRA]

    Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies [True PDF] [Team-IRA]

    Peter Rising, 2023
    PDF
    Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

    Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

    Reza Montasari, 2024
    PDF
    Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts (Advanced Sciences and Technologies for Security Applications)

    Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts (Advanced Sciences and Technologies for Security Applications)

    Juan Cayón Peña (editor), 2022
    PDF
    Coupled Site and Soil-Structure Interaction Effects with Application to Seismic Risk Mitigation (NATO Science for Peace and Security Series C: Environmental Security)

    Coupled Site and Soil-Structure Interaction Effects with Application to Seismic Risk Mitigation (NATO Science for Peace and Security Series C: Environmental Security)

    Tom Schanz, Roumen Iankov, 2009
    PDF
    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Committee on Balancing Scientific Openness and National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 1999
    PDF
    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Committee on Balancing Scientific Openness and National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 1999
    PDF
    Biotechnology, Security and the Search for Limits: An Inquiry into Research and Methods (New Security Challenges)

    Biotechnology, Security and the Search for Limits: An Inquiry into Research and Methods (New Security Challenges)

    Brian Rappert, 2007
    PDF
    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Ari Takanen, Jared DeMott, Charlie Miller, 2008
    PDF
    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Ari Takanen, Jared DeMott, Charlie Miller, 2008
    PDF
    Air Pollution Modeling and its Application XIX (NATO Science for Peace and Security Series C: Environmental Security)

    Air Pollution Modeling and its Application XIX (NATO Science for Peace and Security Series C: Environmental Security)

    Carlos Borrego, Ana Isabel Miranda, 2008
    PDF
    Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security)

    Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security)

    Douw G. Steyn, S. T. Rao, 2010
    PDF
    Security and Liberty: Restriction by Stealth (Crime Prevention and Security Management)

    Security and Liberty: Restriction by Stealth (Crime Prevention and Security Management)

    Kate Moss-Brookes
    PDF
    Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings

    Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings

    Michael Roland, Josef Langer, Josef Scharinger (auth.), Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.), 2012
    PDF
    Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop

    Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop

    Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko, 2005
    PDF
    Calculated Risks : Highly Radioactive Waste and Homeland Security (Homeland Security)

    Calculated Risks : Highly Radioactive Waste and Homeland Security (Homeland Security)

    Kenneth A. Rogers and Marvin G. Kingsley, 2007
    PDF
    Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Database and Application Security XV: IFIP TC11 / WG11.3 Fifteenth Annual Working Conference on Database and Application Security July 15–18, 2001, Niagara on the Lake, Ontario, Canada

    Sushil Jajodia, Duminda Wijesekera (auth.), Martin S. Olivier, David L. Spooner (eds.), 2002
    PDF
    Database and Applications Security: Integrating Information Security and Data Management

    Database and Applications Security: Integrating Information Security and Data Management

    Bhavani Thuraisingham, 2005
    PDF
    Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

    Implementing database security and auditing : a guide for DBAs, information security administrators and auditors

    Ron Ben-Natan, 2005
    PDF
    Mergers and Acquisitions Security: Corporate Restructuring and Security Management

    Mergers and Acquisitions Security: Corporate Restructuring and Security Management

    Edward Halibozek MBA, Gerald L. Kovacich CFECPPCISSP, 2005
    PDF
    Afghanistan, Arms and Conflict: Armed Groups, Disarmament and Security in a Post-war Society (Contemporary Security Studies)

    Afghanistan, Arms and Conflict: Armed Groups, Disarmament and Security in a Post-war Society (Contemporary Security Studies)

    Michael Vinay Bhatia, Mark Sedra, 2008
    PDF
    Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure

    Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure

    Eric D. Knapp and Raj Samani (Auth.), 2013
    PDF
    China, the United States and South-East Asia: Contending Perspectives on Politics, Security and Economics (Asian Security Studies)

    China, the United States and South-East Asia: Contending Perspectives on Politics, Security and Economics (Asian Security Studies)

    SheldonSimon, 2007
    PDF
    Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)

    Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)

    Adnan Ibrahimbegovic, Muhamed Zlatar, 2009
    PDF
    Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security

    Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security

    PDF
    Biofuels and Food Security: Biofuel Impact on Food Security in Brazil, Asia and Major Producing Countries

    Biofuels and Food Security: Biofuel Impact on Food Security in Brazil, Asia and Major Producing Countries

    Tatsuji Koizumi (auth.), 2014
    |< ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.