ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۷ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

    Ken Barker (auth.), Lachlan M. MacKinnon (eds.), 2012
    PDF
    Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

    Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA

    Peng Liu, Sushil Jajodia, Catherine D. McCollum (auth.), Vijay Atluri, John Hale (eds.), 2000
    PDF
    Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

    Advances in Information and Computer Security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

    Masaya Sato, Toshihiro Yamauchi (auth.), Kazuo Sakiyama, Masayuki Terada (eds.), 2013
    PDF
    Testing Web Security: Assessing the Security of Web Sites and Applications

    Testing Web Security: Assessing the Security of Web Sites and Applications

    Steven Splaine, 2002
    PDF
    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Eric D. Knapp, Raj Samani, 2013
    EPUB
    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

    Eric D. Knapp, Raj Samani, 2013
    PDF
    Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

    Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

    Ladjel Bellatreche, 2006
    PDF
    Computer Incident Response and Product Security (Networking Technology: Security)

    Computer Incident Response and Product Security (Networking Technology: Security)

    Damir Rajnovic, 2010
    PDF
    Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544)

    Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544)

    Tesch, Dale.; Greg Abelar, 2007
    CHM
    Security Threat Mitigation and Response: Understanding Cisco Security MARS

    Security Threat Mitigation and Response: Understanding Cisco Security MARS

    Dale Tesch, Greg Abelar, 2006
    PDF
    Rescue of Sturgeon Species in the Ural River Basin (NATO Science for Peace and Security Series C: Environmental Security)

    Rescue of Sturgeon Species in the Ural River Basin (NATO Science for Peace and Security Series C: Environmental Security)

    V. Lagutov, 2008
    PDF
    Convergence of Food Security, Energy Security and Sustainable Agriculture

    Convergence of Food Security, Energy Security and Sustainable Agriculture

    David D. Songstad, Jerry L. Hatfield, Dwight T. Tomes (eds.), 2014
    PDF
    Crop Biosecurity: Assuring our Global Food Supply (NATO Science for Peace and Security Series C: Environmental Security)

    Crop Biosecurity: Assuring our Global Food Supply (NATO Science for Peace and Security Series C: Environmental Security)

    Maria Lodovica Gullino, Jacqueline Fletcher, Abraham Gamliel, James Peter Stack, 2008
    PDF
    The Politics of Food: The Global Conflict between Food Security and Food Sovereignty (Praeger Security International)

    The Politics of Food: The Global Conflict between Food Security and Food Sovereignty (Praeger Security International)

    William D. Schanbacher, 2010
    PDF
    Drinking Water Security for Engineers, Planners, and Managers. Integrated Water Security Series

    Drinking Water Security for Engineers, Planners, and Managers. Integrated Water Security Series

    Ravi Jain (Eds.), 2014
    PDF
    Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings

    Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings

    Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin (eds.), 2007
    PDF
    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.), 2003
    PDF
    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

    Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.), 2003
    PDF
    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
    PDF
    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

    Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.), 2005
    PDF
    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
    PDF
    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Computer Network Security: 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

    Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.), 2010
    PDF
    Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

    Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

    Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.), 2012
    |< ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.