ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۴ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings

    Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings

    Ann Cavoukian (auth.), 2011
    PDF
    Optical Imaging Sensors and Systems for Homeland Security Applications (Advanced Sciences and Technologies for Security Applications)

    Optical Imaging Sensors and Systems for Homeland Security Applications (Advanced Sciences and Technologies for Security Applications)

    Bahram Javidi, 2010
    PDF
    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

    Simone Fischer-Hübner (eds.), 2001
    PDF
    Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Volume 11 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Volume 11 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    J. Victoroff, 2006
    PDF
    Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings

    Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings

    Steven Latré, 2015
    PDF
    Security in Ad-hoc and Sensor Networks (Computer and Network Security)

    Security in Ad-hoc and Sensor Networks (Computer and Network Security)

    Raheem Beyah, 2009
    PDF
    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Bernard Peter Robichau, 2014
    PDF
    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Bernard Peter Robichau (auth.), 2014
    PDF
    Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

    Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

    András Belokosztolszki, 2003
    PDF
    Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Joaquin Garcia-Alfaro, 2015
    PDF
    In Larger Freedom: Towards Development, Security And Human Rights for All - Report of the Secretary-general: Towards Development, Security And Human Rights for All

    In Larger Freedom: Towards Development, Security And Human Rights for All - Report of the Secretary-general: Towards Development, Security And Human Rights for All

    United Nations, 2005
    PDF
    Extreme Man-Made and Natural Hazards in Dynamics of Structures (NATO Science for Peace and Security Series C: Environmental Security)

    Extreme Man-Made and Natural Hazards in Dynamics of Structures (NATO Science for Peace and Security Series C: Environmental Security)

    Adnan Ibrahimbegovic, 2007
    PDF
    Nuclear Security Culture: From National Best Practices to International Standards - Volume 28 NATO Science for Peace and Security Series: Human and Societal Dynamics

    Nuclear Security Culture: From National Best Practices to International Standards - Volume 28 NATO Science for Peace and Security Series: Human and Societal Dynamics

    Igor Khripunov, 2007
    PDF
    Buying Defence and Security in Europe: The EU Defence and Security Procurement Directive in Context

    Buying Defence and Security in Europe: The EU Defence and Security Procurement Directive in Context

    Martin Trybus, 2014
    PDF
    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings

    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007. Proceedings

    Joachim Biskup, 2007
    PDF
    Future NATO Security: Addressing the Challenges of Evolving Security and Information Sharing Systems and Architectures (NATO Science Series: Science & Technology Policy)

    Future NATO Security: Addressing the Challenges of Evolving Security and Information Sharing Systems and Architectures (NATO Science Series: Science & Technology Policy)

    Martin Edmonds, 2004
    PDF
    Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

    Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

    Stelios Karanastasis, 1999
    PDF
    Intra-State Conflict, Governments and Security: Dilemmas of Deterrence and Assurance (Contemporary Security Studies)

    Intra-State Conflict, Governments and Security: Dilemmas of Deterrence and Assurance (Contemporary Security Studies)

    Stephe Saideman, 2008
    PDF
    Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

    Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

    Karl Scheibelhofer (auth.), 2001
    PDF
    Swords and Sustenance: The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security)

    Swords and Sustenance: The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security)

    Robert Legvold, 2004
    PDF
    Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

    Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

    Cecilia S. Gal, 2009
    PDF
    Virus Diseases and Crop Biosecurity (NATO Science for Peace and Security Series C: Environmental Security)

    Virus Diseases and Crop Biosecurity (NATO Science for Peace and Security Series C: Environmental Security)

    Ian Cooper, 2006
    PDF
    Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23rd – 24th September 1996

    Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23rd – 24th September 1996

    Patrick Horster (eds.), 1996
    PDF
    Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

    Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

    Roger M. Needham (auth.), 1990
    PDF
    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Gene Tsudik, 2008
    |< ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.