ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۱ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    EPUB
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    PDF
    Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings

    Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings

    Rémi Badonnel, 2016
    PDF
    Security and the War on Terror: Civil-Military Cooperation in a New Age (Contemporary Security Studies)

    Security and the War on Terror: Civil-Military Cooperation in a New Age (Contemporary Security Studies)

    Alex Bellamy, 2007
    PDF
    Comparative Legal Approaches to Homeland Security and Anti-terrorism (Homeland Security)

    Comparative Legal Approaches to Homeland Security and Anti-terrorism (Homeland Security)

    James Beckman, 2007
    PDF
    The Globalization of Security: State Power, Security Provision and Legitimacy

    The Globalization of Security: State Power, Security Provision and Legitimacy

    Bryan Mabee (auth.), 2009
    PDF
    Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark

    Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark

    A. K. Stanley (auth.), 1997
    PDF
    Future Security of the Global Arctic: State Policy, Economic Security and Climate

    Future Security of the Global Arctic: State Policy, Economic Security and Climate

    Lassi Heininen (eds.), 2016
    PDF
    Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France

    Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France

    Johan Van Niekerk, 2004
    PDF
    Exploring the Security Landscape: Non-Traditional Security Challenges

    Exploring the Security Landscape: Non-Traditional Security Challenges

    Anthony J. Masys (eds.), 2016
    PDF
    Exporting Security: International Engagement, Security Cooperation, and the Changing Face of the U.S. Military

    Exporting Security: International Engagement, Security Cooperation, and the Changing Face of the U.S. Military

    Derek S. Reveron, 2010
    PDF
    Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA

    Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA

    Dorothy E. Denning (auth.), 2003
    PDF
    Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece

    Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece

    Brian Toone, 2003
    PDF
    Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I

    Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I

    Günther Pernul, 2015
    PDF
    Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part II

    Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part II

    Günther Pernul, 2015
    PDF
    The Changing Politics of European Security: European Security and Trasatlantic Relations (Palgrave studies in European Union Politics)

    The Changing Politics of European Security: European Security and Trasatlantic Relations (Palgrave studies in European Union Politics)

    Stefan Ganzle, 2007
    PDF
    IT Security Management: IT Securiteers - Setting up an IT Security Function

    IT Security Management: IT Securiteers - Setting up an IT Security Function

    Alberto Partida, 2010
    PDF
    IT Security Management: IT Securiteers - Setting up an IT Security Function

    IT Security Management: IT Securiteers - Setting up an IT Security Function

    Alberto Partida, 2010
    PDF
    Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France

    Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France

    Mario Bravetti, 2005
    PDF
    Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993

    Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993

    Bhavani Thuraisingham, 1994
    PDF
    Workplace Security Playbook. The New Manager's Guide to Security Risk

    Workplace Security Playbook. The New Manager's Guide to Security Risk

    Bob Hayes (Eds.), 2013
    PDF
    The United States and the Security Council: Collective Security since the Cold War

    The United States and the Security Council: Collective Security since the Cold War

    Brian Frederking, 2007
    EPUB
    Security Technologies for the World Wide Web (Artech House Computer Security Series)

    Security Technologies for the World Wide Web (Artech House Computer Security Series)

    Rolf Oppliger, 1999
    EPUB
    Windows Server 2012 Security from End to Edge and Beyond  Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond  Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W. Shinder, Yuri Diogenes, 2013
    |< ۱۶ ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.