ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۵ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Offensive Security OSCP

    Offensive Security OSCP

    Offensive Security, 2020
    EPUB
    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Qing Li; Gregory Clark, 2015
    PDF
    Security from Zero: Practical Security for Busy People

    Security from Zero: Practical Security for Busy People

    Eric Higgins, 2020
    PDF
    ISO/IEC 27004:2016, Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

    ISO/IEC 27004:2016, Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

    ISO/IEC JTC 1/SC 27, 2016
    PDF
    Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)

    Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)

    Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor), 2020
    PDF
    Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework

    Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework

    Darren Death, 2017
    EPUB
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)

    Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)

    Padmavathi Ganapathi (editor), D. Shanmugapriya (editor), 2020
    PDF
    Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)

    Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)

    Michael Felderer (editor), Riccardo Scandariato (editor), 2018
    EPUB
    Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)

    Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)

    Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu, 2020
    PDF
    Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

    Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

    Peter Rising, 2020
    EPUB
    Mastering Azure Security: Safeguard your Azure workload with innovative cloud security measures

    Mastering Azure Security: Safeguard your Azure workload with innovative cloud security measures

    Mustafa Toroman, Tom Janetscheck, 2020
    EPUB
    CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners)

    CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners)

    STEVEN, MICHAEL; STEVEN, MICHAEL, 2019
    PDF
    Practical internet of things security : design a security framework for an Internet connected ecosystem

    Practical internet of things security : design a security framework for an Internet connected ecosystem

    Brian Russell; Drew Van Duren, 2018
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Basic Politics of Movement Security: A Talk on Security with J. Sakai + G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks

    Basic Politics of Movement Security: A Talk on Security with J. Sakai + G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks

    J. Sakai; Mandy Hiscocks, 2014
    PDF
    Insuring Security: Biopolitics, Security And Risk

    Insuring Security: Biopolitics, Security And Risk

    Luis Lobo-Guerrero, 2011
    EPUB
    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Resource, Cyber Security, 2021
    PDF
    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Henry Dalziel, Ajin Abraham, 2015
    PDF
    Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

    Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

    Carolyn Mae Kim; Robert H Deatherage Jr, 2021
    PDF
    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Laura Chappell, 2012
    PDF
    Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

    Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

    Mark Talabis, Robert McPherson, Inez Miyamoto, Jason Martin, 2014
    PDF
    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Henry Dalziel, Ajin Abraham, 2015
    PDF
    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Iwan Hoogendoorn, 2021
    |< ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.