ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۲ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)

    Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)

    Virginia Koukouliou, Magdalena Ujevic, Otto Premstaller, 2009
    PDF
    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
    PDF
    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
    PDF
    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

    Steve Barker (auth.), Vijay Atluri (eds.), 2008
    PDF
    GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures

    GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures

    Masoud Kalali, 2010
    PDF
    Cooperating for Peace and Security: Evolving Institutions and Arrangements in a Context of Changing U.S. Security Policy

    Cooperating for Peace and Security: Evolving Institutions and Arrangements in a Context of Changing U.S. Security Policy

    Bruce D. Jones, Shepard Forman, Richard Gowan (eds.), 2009
    PDF
    Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security

    Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security

    John Mueller, Mark G. Stewart, 2011
    PDF
    Ethics, Technology and the American Way of War: Cruise Missiles and US Security Policy (Contemporary Security Studies)

    Ethics, Technology and the American Way of War: Cruise Missiles and US Security Policy (Contemporary Security Studies)

    Reuben E. Brigety II, 2007
    PDF
    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)

    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, ... Networks and Telecommunications)

    Igor Kotenko, Victor Skormin, 2010
    PDF
    Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings

    Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings

    Kun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.), 2013
    PDF
    Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

    Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

    Chris J. Mitchell, Namhyun Hur (auth.), Borka Jerman-Blažič, Tomaž Klobučar (eds.), 2002
    PDF
    Management of Weather and Climate Risk in the Energy Industry (NATO Science for Peace and Security Series C: Environmental Security)

    Management of Weather and Climate Risk in the Energy Industry (NATO Science for Peace and Security Series C: Environmental Security)

    Alberto Troccoli, 2009
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Vandana P. Janeja, 2005
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Vandana P. Janeja, 2005
    PDF
    Global Security and the War on Terror: Elite Power and the Illusion of Control (Contemporary Security Studies)

    Global Security and the War on Terror: Elite Power and the Illusion of Control (Contemporary Security Studies)

    Paul Rogers, 2007
    PDF
    Chemicals as Intentional and Accidental Global Environmental Threats (NATO Science for Peace and Security Series C: Environmental Security)

    Chemicals as Intentional and Accidental Global Environmental Threats (NATO Science for Peace and Security Series C: Environmental Security)

    Lubomir Simeonov, 2006
    PDF
    Advances in Sensing with Security Applications (NATO Science for Peace and Security Series A: Chemistry and Biology)

    Advances in Sensing with Security Applications (NATO Science for Peace and Security Series A: Chemistry and Biology)

    Jim Byrnes, 2006
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Douglas Yeung, 2006
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

    Douglas Yeung, 2006
    PDF
    A Rising China and Security in East Asia: Identity Construction and Security Discourse (Politics in Asia)

    A Rising China and Security in East Asia: Identity Construction and Security Discourse (Politics in Asia)

    Rex Li, 2008
    PDF
    The Socio-Economic Causes and Consequences of Desertification in Central Asia (NATO Science for Peace and Security Series C: Environmental Security)

    The Socio-Economic Causes and Consequences of Desertification in Central Asia (NATO Science for Peace and Security Series C: Environmental Security)

    Roy Behnke, 2008
    PDF
    Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom

    Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom

    Jan Iwanik, 2005
    PDF
    Radical Islam and International Security: Challenges and Responses (Besa Studies in International Security)

    Radical Islam and International Security: Challenges and Responses (Besa Studies in International Security)

    Efraim Inbar: H, 2008
    PDF
    Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings

    Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006. Proceedings

    Nicola Zannone, 2006
    PDF
    Exposure and Risk Assessment of Chemical Pollution - Contemporary Methodology (NATO Science for Peace and Security Series C: Environmental Security)

    Exposure and Risk Assessment of Chemical Pollution - Contemporary Methodology (NATO Science for Peace and Security Series C: Environmental Security)

    Lubomir I. Simeonov, 2009
    |< ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.