ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Wiley Computer، صفحه ۲۲ از ۴۰۵ در بین ۱۰,۱۲۰ کتاب.
    PDF
    Computer and Information Sciences III: 27th International Symposium on Computer and Information Sciences

    Computer and Information Sciences III: 27th International Symposium on Computer and Information Sciences

    Arnold L. Rosenberg (auth.), 2013
    PDF
    Learning Stencyl 3.x Game Development: A fast-paced, hands-on guide for developing a feature-complete video game on almost any desktop computer, without writing a single line of computer code

    Learning Stencyl 3.x Game Development: A fast-paced, hands-on guide for developing a feature-complete video game on almost any desktop computer, without writing a single line of computer code

    Innes Borkwood, 2013
    CHM
    Computer Forensics and Privacy (Artech House Computer Security Series)

    Computer Forensics and Privacy (Artech House Computer Security Series)

    Michael A. Caloyannides, 2001
    PDF
    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Barbara Simons (auth.), 2005
    PDF
    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Barbara Simons (auth.), 2005
    DJVU
    The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution

    The Invisible Computer: Why Good Products Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution

    Donald A. Norman, 1999
    PDF
    Frontiers in Computer Education: Proceedings of the 2nd International Conference on Frontiers in Computer Education

    Frontiers in Computer Education: Proceedings of the 2nd International Conference on Frontiers in Computer Education

    Wang, 2015
    PDF
    Theoretical computer science

    Theoretical computer science

    European Association for Theoretical Computer Science, 1975
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part I

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part I

    Kaiming He, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part I

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part I

    Kaiming He, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part III

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part III

    Andrej Mikulík, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part III

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part III

    Andrej Mikulík, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part V

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part V

    Anush K. Moorthy, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part V

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part V

    Anush K. Moorthy, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI

    Zhiwu Lu, 2010
    PDF
    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI

    Computer Vision – ECCV 2010: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part VI

    Zhiwu Lu, 2010
    PDF
    Operational Amplifiers - Theory and Design (The Kluwer International Series in Engineering and Computer Science, Volume 605) (The Springer International Series in Engineering and Computer Science)

    Operational Amplifiers - Theory and Design (The Kluwer International Series in Engineering and Computer Science, Volume 605) (The Springer International Series in Engineering and Computer Science)

    Johan H. Huijsing, 2000
    PDF
    How to Solve It by Computer (Prentice-Hall International Series in Computer Science)

    How to Solve It by Computer (Prentice-Hall International Series in Computer Science)

    R. G. Dromey, 1982
    EPUB
    iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It

    iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It

    Steve Wozniak, 2007
    PDF
    SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings

    SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings

    Andris Ambainis (auth.), 2008
    PDF
    SOFSEM 2014: Theory and Practice of Computer Science: 40th International Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 26-29, 2014, Proceedings

    SOFSEM 2014: Theory and Practice of Computer Science: 40th International Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 26-29, 2014, Proceedings

    Miklos Biro (auth.), 2014
    PDF
    Product Modeling for Computer Integrated Design and Manufacture: TC5/WG5.2 International Workshop on Geometric Modeling in Computer Aided Design 19–23 May 1996, Airlie, Virginia, USA

    Product Modeling for Computer Integrated Design and Manufacture: TC5/WG5.2 International Workshop on Geometric Modeling in Computer Aided Design 19–23 May 1996, Airlie, Virginia, USA

    M. J. Pratt, 1997
    PDF
    Computer Security – ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

    Computer Security – ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

    Michael K. Reiter (auth.), 2007
    PDF
    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

    Mirosław Kutyłowski, 2014
    PDF
    Perspectives on Computer Science. From the 10th Anniversary Symposium at the Computer Science Department, Carnegie-Mellon University

    Perspectives on Computer Science. From the 10th Anniversary Symposium at the Computer Science Department, Carnegie-Mellon University

    Anita Jones, 1977
    |< ۱۷ ۱۸ ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.