ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۶ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition

    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition

    Paulino Calderon, 2021
    PDF
    Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)

    Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)

    Arun Kumar Singh (editor), Balwinder Raj (editor), 2021
    EPUB
    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Paulino Calderon, 2021
    PDF
    Blockchain for International Security: The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls (Advanced Sciences and Technologies for Security Applications)

    Blockchain for International Security: The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls (Advanced Sciences and Technologies for Security Applications)

    Cindy Vestergaard (editor), 2021
    EPUB
    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Iwan Hoogendoorn, 2021
    EPUB
    Russia's Policy Challenges: Security, Stability and Development: Security, Stability and Development

    Russia's Policy Challenges: Security, Stability and Development: Security, Stability and Development

    Stephen K. Wegren, 2016
    EPUB
    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mark Dunkerley, Matt Tumbarello, 2022
    PDF
    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mark Dunkerley, Matt Tumbarello, 2022
    PDF
    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1

    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1

    Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, 2023
    PDF
    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2

    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2

    Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, 2023
    PDF
    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Institute of Medicine National Academy of Engineering National Academy of Sciences; and Public Policy Engineering Committee on Science; Panel on the Impact of National Security Controls on International Technology Transfer, 1987
    PDF
    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings (Lecture Notes in Computer Science, 5094)

    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings (Lecture Notes in Computer Science, 5094)

    Vijay Atluri (editor), 2008
    PDF
    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

    Steve Barker (editor), Gail-Joon Ahn (editor), 2007
    PDF
    Food and Nutrition Security in the Kingdom of Saudi Arabia, Vol. 1: National Analysis of Agricultural and Food Security

    Food and Nutrition Security in the Kingdom of Saudi Arabia, Vol. 1: National Analysis of Agricultural and Food Security

    Adam E. Ahmed (editor), Jameel M. Al-Khayri (editor), Azharia A. Elbushra (editor), 2024
    PDF
    Security in the Global Commons and Beyond (Advanced Sciences and Technologies for Security Applications)

    Security in the Global Commons and Beyond (Advanced Sciences and Technologies for Security Applications)

    J. Martín Ramírez (editor), Bartolomé Bauzá-Abril (editor), 2021
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    Praphul Chandra, 2005
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    Praphul Chandra, 2005
    PDF
    Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Gal Luft, Anne Korin, 2009
    PDF
    Doing Security (Crime Prevention and Security Management)

    Doing Security (Crime Prevention and Security Management)

    Mark Button, 2009
    PDF
    Doing Security (Crime Prevention and Security Management)

    Doing Security (Crime Prevention and Security Management)

    Mark Button, 2009
    PDF
    A Ready and Resilient Workforce for the Department of Homeland Security: Protecting America's Front Line

    A Ready and Resilient Workforce for the Department of Homeland Security: Protecting America's Front Line

    Committee on the Department of Homeland Security Workforce Resilience, Board on Health Sciences Policy, Institute of Medicine, 2013
    PDF
    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Bart Preneel (auth.), Tsuyoshi Takagi, Masahiro Mambo (eds.), 2009
    PDF
    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Jaideep Vaidya (auth.), Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.), 2010
    PDF
    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing)

    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing)

    S. H. (Basie) von Solms (auth.), Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.), 2006
    PDF
    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Ian Piumarta, Alessandro Warth (auth.), Robert Hirschfeld, Kim Rose (eds.), 2010
    |< ۲۱ ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.