ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۵ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web ... (Nato Science for Peace and Security)

    Security Informatics and Terrorism: Patrolling the Web:Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web ... (Nato Science for Peace and Security)

    Cecilia S. Gal
    PDF
    Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers

    Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers

    Frances Cleary, 2015
    PDF
    Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers

    Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers

    Frances Cleary, 2014
    PDF
    Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers

    Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers

    Francesco Di Cerbo, 2013
    PDF
    Security for Wireless Sensor Networks (Advances in Information Security)

    Security for Wireless Sensor Networks (Advances in Information Security)

    Donggang Liu, 2006
    PDF
    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

    Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

    Pieter Agten, 2012
    PDF
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Raoul Strackx, 2010
    PDF
    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

    Raoul Strackx, 2010
    PDF
    Novel Biotechnologies for Biocontrol Agent Enhancement and Management (NATO Security through Science Series   NATO Security through Science Series A: Chemistry and Biology)

    Novel Biotechnologies for Biocontrol Agent Enhancement and Management (NATO Security through Science Series NATO Security through Science Series A: Chemistry and Biology)

    Maurizio Vurro (Editor), 2007
    PDF
    Security leader insights for risk management : lessons and strategies from leading security professionals

    Security leader insights for risk management : lessons and strategies from leading security professionals

    Richard E Chase, 2014
    PDF
    Mapping Transatlantic Security Relations: The EU, Canada and the War on Terror (Routledge Studies in Liberty and Security)

    Mapping Transatlantic Security Relations: The EU, Canada and the War on Terror (Routledge Studies in Liberty and Security)

    Mark B. Salter, 2010
    PDF
    Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)

    Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)

    Wenke Lee, 2010
    PDF
    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Kenneth J. Knapp, 2009
    PDF
    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)

    Kenneth J. Knapp, 2009
    PDF
    Building a Home Security System with Raspberry Pi: Build your own sophisticated modular home security system using the popular Raspberry Pi board

    Building a Home Security System with Raspberry Pi: Build your own sophisticated modular home security system using the popular Raspberry Pi board

    Matthew Poole, 2015
    PDF
    Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World

    Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World

    Security,
    PDF
    English-Chinese, Chinese-English Nuclear Security Glossary

    English-Chinese, Chinese-English Nuclear Security Glossary

    Committee on the U.S.-Chinese Glossary of Nuclear Security Terms, 2008
    PDF
    Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework

    Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework

    Abraham, Ajin, 2015
    PDF
    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Elisa Bertino, 2003
    PDF
    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Elisa Bertino, 2003
    PDF
    Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

    Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain

    Lawrence H. Cox (auth.), 2004
    PDF
    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    S. H. (Basie) von Solms (auth.), 2010
    PDF
    Conflict, Security and the Reshaping of Society: The Civilization of War (Routledge studies in liberty and security)

    Conflict, Security and the Reshaping of Society: The Civilization of War (Routledge studies in liberty and security)

    Alessandro Dal Lago, 2010
    PDF
    ISO/IEC 27003:2010, Information technology - Security techniques - Information security management system implementation guidance

    ISO/IEC 27003:2010, Information technology - Security techniques - Information security management system implementation guidance

    ISO/IEC/JTC 1/SC 27, 2010
    PDF
    Becoming a global chief security executive officer : a how to guide for next generation security leaders

    Becoming a global chief security executive officer : a how to guide for next generation security leaders

    Cloutier, 2015
    |< ۲۰ ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.