ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Cryptography، صفحه ۲۷ از ۳۷ در بین ۹۱۳ کتاب.
    PDF
    Selected Areas in Cryptography

    Selected Areas in Cryptography

    Evangelos Kranakis, 1997
    PDF
    Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)

    Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)

    Arnaldo Garcia, 2006
    PDF
    Non-commutative cryptography and complexity of group-theoretic problems

    Non-commutative cryptography and complexity of group-theoretic problems

    Alexei Myasnikov, 2011
    PDF
    RSA and public-key cryptography

    RSA and public-key cryptography

    Richard A. Mollin, 2003
    PDF
    RSA and Public-Key Cryptography

    RSA and Public-Key Cryptography

    Richard A. Mollin, 2002
    PDF
    RSA and public-key cryptography

    RSA and public-key cryptography

    Richard A. Mollin, 2003
    PDF
    RSA and Public-Key Cryptography

    RSA and Public-Key Cryptography

    Richard A. Mollin, 2003
    PDF
    Lightweight Cryptography for Security and Privacy: Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers

    Lightweight Cryptography for Security and Privacy: Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers

    Erich Wenger (auth.), 2013
    PDF
    Understanding Cryptography: A Textbook for Students and Practitioners

    Understanding Cryptography: A Textbook for Students and Practitioners

    Christof Paar, 2010
    DJVU
    Elliptic curves and their applications to cryptography

    Elliptic curves and their applications to cryptography

    Enge A., 1999
    PDF
    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Michaël Quisquater (auth.), 2012
    PDF
    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Michaël Quisquater (auth.), 2012
    PDF
    Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

    Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

    A. Al Jabri (auth.), 2001
    PDF
    Lightweight Cryptography for Security and Privacy: 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers

    Lightweight Cryptography for Security and Privacy: 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers

    Tim Güneysu, 2016
    PDF
    Number theory in science and communication: with applications in cryptography, physics, digital information, computing, and self-similarity

    Number theory in science and communication: with applications in cryptography, physics, digital information, computing, and self-similarity

    Manfred Schroeder (auth.), 2009
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Manfred Schroeder (auth.), 2009
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    M.R. Schroeder, 2001
    PDF
    Computer Security & Cryptography

    Computer Security & Cryptography

    Cooper J.A., 2000
    PDF
    Computer Security and Cryptography

    Computer Security and Cryptography

    Alan G. Konheim, 2007
    PDF
    Computer Security and Cryptography

    Computer Security and Cryptography

    Alan G. Konheim, 2007
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Biology, Digital Information, and Computing

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Biology, Digital Information, and Computing

    Professor Dr. Manfred R. Schroeder (auth.), 1984
    DJVU
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    DJVU
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 2006
    |< ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.