ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۵ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Roger Dingledine, 2009
    PDF
    Research Directions in Data and Applications Security XVIII: IFIP TC 11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, Vol. 18

    Research Directions in Data and Applications Security XVIII: IFIP TC 11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, Vol. 18

    Farkas C. (ed), 2004
    PDF
    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Li-Chiou Chen, 2004
    PDF
    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

    Li-Chiou Chen, 2004
    PDF
    Nanomaterials: Risks and Benefits (NATO Science for Peace and Security Series C: Environmental Security)

    Nanomaterials: Risks and Benefits (NATO Science for Peace and Security Series C: Environmental Security)

    Igor Linkov, 2009
    PDF
    RED HAT LINUX SECURITY AND OPTIMIZATION HUNGRY MINDS =Red Hat Linux Security And Optimization

    RED HAT LINUX SECURITY AND OPTIMIZATION HUNGRY MINDS =Red Hat Linux Security And Optimization

    Mohammed J. Kabir, 2001
    PDF
    Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings

    Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings

    Rémi Badonnel, 2016
    PDF
    Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France

    Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France

    Mario Bravetti, 2005
    EPUB
    Windows Server 2012 Security from End to Edge and Beyond  Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond  Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W. Shinder, Yuri Diogenes, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    MOBI
    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Transportation Security Against Terrorism - Volume 54 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    Transportation Security Against Terrorism - Volume 54 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    M. Tahmisoglu
    PDF
    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

    Andrzej Białas (auth.), 2005
    PDF
    Climate Change and Security: A Gathering Storm of Global Challenges (Security and the Environment)

    Climate Change and Security: A Gathering Storm of Global Challenges (Security and the Environment)

    Christian Webersik, 2010
    PDF
     SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization

    SDN and NFV Security: Security Analysis of Software-Defined Networking and Network Function Virtualization

    Rahamatullah Khondoker (eds.), 2018
    PDF
    Nmap: Network Exploration and Security Auditing Cookbook - Second Edition: Network discovery and security scanning at your fingertips

    Nmap: Network Exploration and Security Auditing Cookbook - Second Edition: Network discovery and security scanning at your fingertips

    Paulino Calderon, 2017
    PDF
    Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy

    Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy

    Doyle, J., 2011
    PDF
    Nmap: Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Nmap: Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Paulino Calderon, 2017
    PDF
    Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel

    Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel

    Peter De Tender, David Rendon, Samuel Erskine, 2019
    PDF
    Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)

    Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)

    Padmavathi Ganapathi (editor), D. Shanmugapriya (editor), 2020
    PDF
    Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)

    Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)

    Michael Felderer (editor), Riccardo Scandariato (editor), 2018
    PDF
    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Iwan Hoogendoorn, 2021
    PDF
    Intelligent and Connected Vehicle Security (River Publishers Series in Security and Digital Forensics)

    Intelligent and Connected Vehicle Security (River Publishers Series in Security and Digital Forensics)

    Jiajia Liu (editor), Abderrahim Benslimane (editor), 2021
    |< ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.