ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۷۵ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    MOBI
    A Hacker In A Hacker World: Doing security penetration, the right way.

    A Hacker In A Hacker World: Doing security penetration, the right way.

    Time Room, 2016
    EPUB
    A Hacker In A Hacking World: Doing security penetration, the right way

    A Hacker In A Hacking World: Doing security penetration, the right way

    Time Room, 2016
    PDF
    Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites (CCPS Guidelines)

    Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites (CCPS Guidelines)

    Center for Chemical Process Safety (CCPS), 2003
    PDF
    Guidelines for Chemical Transportation Safety, Security, and Risk Management

    Guidelines for Chemical Transportation Safety, Security, and Risk Management

    Center for Chemical Process Safety (CCPS), 2008
    PDF
    Group Testing Theory in Network Security: An Advanced Solution

    Group Testing Theory in Network Security: An Advanced Solution

    My T. Thai (auth.), 2012
    PDF
    Your Government Failed You: Breaking the Cycle of National Security Disasters

    Your Government Failed You: Breaking the Cycle of National Security Disasters

    Richard A. Clarke, 2008
    PDF
    Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

    Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

    John Hoopes, 2008
    PDF
    Virtualization Security: Business Continuity (EC-Council Disaster Recovery Professional (Edrp))

    Virtualization Security: Business Continuity (EC-Council Disaster Recovery Professional (Edrp))

    EC-Council, 2010
    PDF
    The Everyday Resilience of the City: How Cities Respond to Terrorism and Disaster (New Security Challenges)

    The Everyday Resilience of the City: How Cities Respond to Terrorism and Disaster (New Security Challenges)

    Jon Coaffee, David Murakami Wood, Peter Rogers, 2008
    PDF
    Hadoop Security: Protecting Your Big Data Platform

    Hadoop Security: Protecting Your Big Data Platform

    Ben Spivey, Joey Echeverria, 2015
    EPUB
    Hadoop Security: Protecting Your Big Data Platform

    Hadoop Security: Protecting Your Big Data Platform

    Ben Spivey, Joey Echeverria, 2015
    MOBI
    Hadoop Security: Protecting Your Big Data Platform

    Hadoop Security: Protecting Your Big Data Platform

    Ben Spivey, Joey Echeverria, 2015
    PDF
    Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)

    Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)

    Amy Wenxuan Ding, 2009
    PDF
    Optimisation of Disaster Forecasting and Prevention Measures in the Context of Human and Social Dynamics - Volume 52 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    Optimisation of Disaster Forecasting and Prevention Measures in the Context of Human and Social Dynamics - Volume 52 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    I. Apostol, D.L. Barry, W.G. Coldewey and D. Reimer, 2009
    PDF
    Human Security and Natural Disasters

    Human Security and Natural Disasters

    Christopher Hobson, Paul Bacon, Robin Cameron, 2014
    PDF
    Food Security and Risk Reduction in Bangladesh

    Food Security and Risk Reduction in Bangladesh

    Umma Habiba, Abu Wali Raghib Hassan, Md. Anwarul Abedin, Rajib Shaw (eds.), 2015
    PDF
    Food Security and Risk Reduction in Bangladesh

    Food Security and Risk Reduction in Bangladesh

    Umma Habiba, Md. Anwarul Abedin, Abu Wali Raghib Hassan, Rajib Shaw, 2015
    PDF
    European Civil Security Governance: Diversity and Cooperation in Crisis and Disaster Management

    European Civil Security Governance: Diversity and Cooperation in Crisis and Disaster Management

    Raphael Bossong, Hendrik Hegemann (eds.), 2015
    PDF
    Disaster Response and Homeland Security: What Works, What Doesn't

    Disaster Response and Homeland Security: What Works, What Doesn't

    James F. Miskel, 2006
    PDF
    Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings

    Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings

    Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (auth.), Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (eds.), 2012
    PDF
    Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings

    Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings

    Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko, Lei Shu (eds.), 2014
    PDF
    Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings

    Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings

    Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.), 2013
    PDF
    Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

    Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

    Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (eds.), 2014
    PDF
    Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

    Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

    Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.), 2015
    PDF
    Security in an IPv6 Environment

    Security in an IPv6 Environment

    Daniel Minoli, Jake Kouns, 2008
    |< ۲۷۰ ۲۷۱ ۲۷۲ ۲۷۳ ۲۷۴ ۲۷۵ ۲۷۶ ۲۷۷ ۲۷۸ ۲۷۹ ۲۸۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.