ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۷ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    ITIL-Security-Management realisieren : IT-Service Security-Management nach ITIL - so gehen Sie vor

    ITIL-Security-Management realisieren : IT-Service Security-Management nach ITIL - so gehen Sie vor

    Jochen Brunnstein, 2006
    PDF
    Culture and Security: Symbolic Power and the Politics of International Security

    Culture and Security: Symbolic Power and the Politics of International Security

    Michael C. Williams, 2005
    PDF
    Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security)

    Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security)

    B. Ganor, 2007
    PDF
    Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

    Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

    Kurt W. Radtke, 2000
    EPUB
    The Security Agencies of the United States. How the CIA, FBI, NSA, and Homeland Security Keep Us Safe

    The Security Agencies of the United States. How the CIA, FBI, NSA, and Homeland Security Keep Us Safe

    Tom Streissguth, 2013
    PDF
    Information security architecture : an integrated approach to security in the organization

    Information security architecture : an integrated approach to security in the organization

    Jan Killmeyer Tudor, 2006
    PDF
    Information Security Architecture: An Integrated Approach to Security in the Organization

    Information Security Architecture: An Integrated Approach to Security in the Organization

    Jan Killmeyer, 2000
    PDF
    Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

    Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

    Jan Killmeyer, 2006
    PDF
    Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA

    Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA

    Sabrina De Capitani di Vimercati, 2004
    PDF
    Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings

    Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings

    Ann Cavoukian (auth.), 2011
    PDF
    From Solidarity to Martial Law: The Polish Crisis of 1980-1981: a Documentary History (National Security Archive Cold War Readers) (National Security Archive Cold War Readers)

    From Solidarity to Martial Law: The Polish Crisis of 1980-1981: a Documentary History (National Security Archive Cold War Readers) (National Security Archive Cold War Readers)

    Andrzej Paczkowski, 2007
    PDF
    Optical Imaging Sensors and Systems for Homeland Security Applications (Advanced Sciences and Technologies for Security Applications)

    Optical Imaging Sensors and Systems for Homeland Security Applications (Advanced Sciences and Technologies for Security Applications)

    Bahram Javidi, 2010
    PDF
    Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment

    Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment

    Darrell Clifton, 2012
    PDF
    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Jaideep Vaidya (auth.), 2010
    PDF
    Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

    Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

    R. William Johnstone, 2008
    PDF
    International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic)

    International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic)

    J. &, 2007
    PDF
    Private Security Companies: Transforming Politics and Security in the Czech Republic

    Private Security Companies: Transforming Politics and Security in the Czech Republic

    Oldřich Bureš (auth.), 2015
    PDF
    Harbour Protection Through Data Fusion Technologies (NATO Science for Peace and Security Series C: Environmental Security)

    Harbour Protection Through Data Fusion Technologies (NATO Science for Peace and Security Series C: Environmental Security)

    Elisa Shahbazian, 2008
    PDF
    Maximum Windows 2000 Security (Maximum Security)

    Maximum Windows 2000 Security (Maximum Security)

    Anonymous, 2001
    PDF
    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

    IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms

    Simone Fischer-Hübner (eds.), 2001
    PDF
    Nanotechnology - Toxicological Issues and Environmental Safety (NATO Science for Peace and Security Series C: Environmental Security)

    Nanotechnology - Toxicological Issues and Environmental Safety (NATO Science for Peace and Security Series C: Environmental Security)

    Simeonova P.P. (Editor), 2007
    PDF
    Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Volume 11 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    Tangled Roots: Social and Psychological Factors in the Genesis of Terrorism, Volume 11 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science)

    J. Victoroff, 2006
    PDF
    JavaScript Security: Learn JavaScript security to make your web applications more secure

    JavaScript Security: Learn JavaScript security to make your web applications more secure

    Y.E Liang, 2014
    PDF
    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Dieter Gollmann, 2006
    PDF
    Building Terrorism Resistant Communities:  Together Against Terrorism, Volume 55 NATO Science for Peace and Security Series - E: Human and Societal Dynamics ... Security, E: Human and Societal Dynamics)

    Building Terrorism Resistant Communities: Together Against Terrorism, Volume 55 NATO Science for Peace and Security Series - E: Human and Societal Dynamics ... Security, E: Human and Societal Dynamics)

    S. Ekici, 2009
    |< ۲۲ ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.