ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۴ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

    Chris Snyder, 2010
    PDF
    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition

    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition

    Chris Snyder, 2010
    PDF
    Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Css Studies in Security and International Relations)

    Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Css Studies in Security and International Relations)

    Myriam Dunn Cavelty, 2007
    PDF
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    DJVU
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-2

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-2

    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-3

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-3

    PDF
    Security+ Guide to Network Security Fundamentals, 4th ed.

    Security+ Guide to Network Security Fundamentals, 4th ed.

    Mark Ciampa, 2012
    PDF
    Crime Prevention, Security and Community Safety Using the 5Is Framework (Crime Prevention and Security Management)

    Crime Prevention, Security and Community Safety Using the 5Is Framework (Crime Prevention and Security Management)

    Paul Ekblom, 2010
    PDF
    The Governance of Policing and Security: Ironies, Myths and Paradoxes (Crime Prevention and Security Management)

    The Governance of Policing and Security: Ironies, Myths and Paradoxes (Crime Prevention and Security Management)

    Bob Hoogenboom, 2010
    PDF
    The Politics of Private Security: Regulation, Reform and Re-Legitimation (Crime Prevention and Security Management)

    The Politics of Private Security: Regulation, Reform and Re-Legitimation (Crime Prevention and Security Management)

    Adam White, 2010
    PDF
    A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)

    A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)

    Sandra Jean Maclean, 2006
    PDF
    America, the EU and Strategic Culture: Transatlantic Security Relations after the Cold War (Contemporary Security Studies)

    America, the EU and Strategic Culture: Transatlantic Security Relations after the Cold War (Contemporary Security Studies)

    Asle Toje, 2008
    PDF
    Communications and Multimedia Security: Proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on communications and multimedia security, 1995

    Communications and Multimedia Security: Proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on communications and multimedia security, 1995

    Reinhard Posch (eds.), 1995
    PDF
    Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

    Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

    Saif ur Rehman, 2010
    EPUB
    The Art of Software Security Testing: Identifying Software Security Flaws

    The Art of Software Security Testing: Identifying Software Security Flaws

    Chris Wysopal, 2006
    PDF
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

    W. Krag BrotbyCISM, 2009
    PDF
    ISO/IEC 27004:2009, Information technology - Security techniques - Information security management - Measurement

    ISO/IEC 27004:2009, Information technology - Security techniques - Information security management - Measurement

    ISO/IEC/JTC 1/SC 27, 2009
    PDF
    Combinatorial Optimization: Methods and Applications:  Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

    Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

    Chvatal V. (ed.), 2011
    PDF
    Radiation and Environmental Safety in North-West Russia: Use of Impact Assessments and Risk Estimation (NATO Science for Peace and Security Series C: Environmental Security)

    Radiation and Environmental Safety in North-West Russia: Use of Impact Assessments and Risk Estimation (NATO Science for Peace and Security Series C: Environmental Security)

    Per Strand, 2006
    PDF
    Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy)

    Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy)

    Hamid R. Nemati, 2009
    PDF
    Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)

    Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)

    Trent Jaeger, 2008
    PDF
    EISS Yearbook 1980–1981 Part II / Annuaire EISS 1980–1981 Partie II: The social security and the economic crisis Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique Travaux de l’Institut Européen de Sécurité Sociale

    EISS Yearbook 1980–1981 Part II / Annuaire EISS 1980–1981 Partie II: The social security and the economic crisis Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique Travaux de l’Institut Européen de Sécurité Sociale

    Prof. Dr. G. M. J. Veldkamp (auth.), 1982
    PDF
    Labor Markets and Social Security: Wage Costs, Social Security Financing and Labor Market Reforms in Europe

    Labor Markets and Social Security: Wage Costs, Social Security Financing and Labor Market Reforms in Europe

    John T. Addison, 1998
    |< ۱۹ ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.