ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۷۹ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    EPUB
    Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances (Advanced Sciences and Technologies for Security Applications)

    Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances (Advanced Sciences and Technologies for Security Applications)

    Chinmay Chakraborty (editor), Jerry Chun-Wei Lin (editor), Mamoun Alazab (editor), 2021
    PDF
    Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances (Advanced Sciences and Technologies for Security Applications)

    Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances (Advanced Sciences and Technologies for Security Applications)

    Chinmay Chakraborty (editor), Jerry Chun-Wei Lin (editor), Mamoun Alazab (editor), 2021
    EPUB
    CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide

    CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide

    Joseph Muniz, Steven Chimes, James Risler, 2021
    EPUB
    Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

    Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

    Hemang Doshi, 2021
    PDF
    Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

    Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

    Hemang Doshi, 2021
    EPUB
    Computer Architecture and Organization: Fundamentals and Architecture Security

    Computer Architecture and Organization: Fundamentals and Architecture Security

    Shuangbao Paul Wang, 2021
    PDF
    Computer Architecture and Organization: Fundamentals and Architecture Security

    Computer Architecture and Organization: Fundamentals and Architecture Security

    Shuangbao Paul Wang, 2021
    PDF
    Black Hat Rust Deep dive into offensive security with the Rust programming language

    Black Hat Rust Deep dive into offensive security with the Rust programming language

    Sylvain Kerkour, 2021
    PDF
    Blockchain for 5G Healthcare Applications: Security and privacy solutions (Healthcare Technologies)

    Blockchain for 5G Healthcare Applications: Security and privacy solutions (Healthcare Technologies)

    Sudeep Tanwar (editor), 2022
    EPUB
    Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices

    Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices

    Joseph MacMillan, 2021
    AZW3
    The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations

    The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations

    Gene Kim; Jez Humble; Patrick Debois; John Willis; Nicole Forsgren, 2021
    PDF
    Security and Terror: American Culture and the Long History of Colonial Modernity

    Security and Terror: American Culture and the Long History of Colonial Modernity

    Eli Jelly-Schapiro, 2018
    PDF
    The Routledge Research Companion to Security Outsourcing

    The Routledge Research Companion to Security Outsourcing

    Joakim Berndtsson, Christopher Kinsey, 2016
    PDF
    Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders

    Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders

    Susan E. McGregor, 2021
    PDF
    Holistic Security : A Strategy Manual for Human Rights Defenders

    Holistic Security : A Strategy Manual for Human Rights Defenders

    Craig Higson Smith, 2018
    EPUB
    Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers (Lecture Notes in Computer Science, 12637)

    Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers (Lecture Notes in Computer Science, 12637)

    Gabriela Nicolescu (editor), Assia Tria (editor), José M. Fernandez (editor), Jean-Yves Marion (editor), Joaquin Garcia-Alfaro (editor), 2021
    EPUB
    Security and Privacy: Select Proceedings of ICSP 2020 (Lecture Notes in Electrical Engineering, 744)

    Security and Privacy: Select Proceedings of ICSP 2020 (Lecture Notes in Electrical Engineering, 744)

    Pantelimon Stănică (editor), Sugata Gangopadhyay (editor), Sumit Kumar Debnath (editor), 2021
    PDF
    Intelligent and Connected Vehicle Security

    Intelligent and Connected Vehicle Security

    Jiajia Liu, 2021
    PDF
    Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021

    Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021

    Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor), 2021
    EPUB
    Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196)

    Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196)

    Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor), 2021
    PDF
    Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196)

    Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196)

    Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor), 2021
    EPUB
    Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence, 997)

    Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence, 997)

    Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding, 2021
    PDF
    Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence, 997)

    Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence, 997)

    Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding, 2021
    PDF
    NATO’s Expansion After the Cold War: Geopolitics and Impacts for International Security

    NATO’s Expansion After the Cold War: Geopolitics and Impacts for International Security

    Jan Eichler, 2021
    PDF
    Information Security Management Principles

    Information Security Management Principles

    Andy Taylor, David Alexander, Amanda Finch, David Sutton, 2020
    |< ۲۷۴ ۲۷۵ ۲۷۶ ۲۷۷ ۲۷۸ ۲۷۹ ۲۸۰ ۲۸۱ ۲۸۲ ۲۸۳ ۲۸۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.