ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۸ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2

    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2

    Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, 2023
    PDF
    Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States

    Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States

    Judith Nora Hardt, Cameron Harrington, Franziskus von Lucke, Adrien Estève, Nick P. Simpson, 2023
    EPUB
    Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security

    Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security

    Redouane MEDDANE, 2022
    PDF
    ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection — Guidance on managing information security risks

    ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection — Guidance on managing information security risks

    ISO, 2022
    EPUB
    Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

    Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

    Luigi Aversa, 2023
    EPUB
    Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    National Research Council; Division on Engineering and Physical Sciences; Laboratory Assessments Board; Committee on Assessment of the Governance Structure of the NNSA National Security Laboratories, 2015
    PDF
    The NICE Cyber Security Framework. Cyber Security Intelligence and Analytics

    The NICE Cyber Security Framework. Cyber Security Intelligence and Analytics

    Izzat Alsmadi, 2023
    PDF
    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Institute of Medicine National Academy of Engineering National Academy of Sciences; and Public Policy Engineering Committee on Science; Panel on the Impact of National Security Controls on International Technology Transfer, 1987
    PDF
    Does an unconditional basic income provide higher effectiveness and efficiency? An Analysis of the social security systems of Germany, Sweden and the United Kingdom: An Analysis of the Social Security Systems of Germany, Sweden and the United Kin...

    Does an unconditional basic income provide higher effectiveness and efficiency? An Analysis of the social security systems of Germany, Sweden and the United Kingdom: An Analysis of the Social Security Systems of Germany, Sweden and the United Kin...

    Wolfgang Müller, 2013
    PDF
    Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies [True PDF] [Team-IRA]

    Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies [True PDF] [Team-IRA]

    Peter Rising, 2023
    PDF
    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science)

    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science)

    Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor), 2024
    PDF
    Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings (Security and Cryptology)

    Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings (Security and Cryptology)

    Weizhi Meng (editor), Mauro Conti (editor), 2022
    PDF
    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings (Lecture Notes in Computer Science, 5094)

    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008, Proceedings (Lecture Notes in Computer Science, 5094)

    Vijay Atluri (editor), 2008
    PDF
    Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers (Security and Cryptology)

    Critical Information Infrastructures Security: 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers (Security and Cryptology)

    Dimitri Percia David (editor), Alain Mermoud (editor), Thomas Maillart (editor), 2021
    PDF
    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS ... (Lecture Notes in Computer Science, 6258)

    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS ... (Lecture Notes in Computer Science, 6258)

    Igor Kotenko (editor), Victor Skormin (editor), 2010
    PDF
    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science)

    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science)

    Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor), 2024
    PDF
    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

    Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings

    Steve Barker (editor), Gail-Joon Ahn (editor), 2007
    PDF
    Moodle 4 Security. Enhance security, regulation, and compliance within your Moodle infrastructure

    Moodle 4 Security. Enhance security, regulation, and compliance within your Moodle infrastructure

    Ian Wild, 2024
    PDF
    Food and Nutrition Security in the Kingdom of Saudi Arabia, Vol. 1: National Analysis of Agricultural and Food Security

    Food and Nutrition Security in the Kingdom of Saudi Arabia, Vol. 1: National Analysis of Agricultural and Food Security

    Adam E. Ahmed (editor), Jameel M. Al-Khayri (editor), Azharia A. Elbushra (editor), 2024
    PDF
    Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

    Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)

    Reza Montasari, 2024
    PDF
    Security in the Global Commons and Beyond (Advanced Sciences and Technologies for Security Applications)

    Security in the Global Commons and Beyond (Advanced Sciences and Technologies for Security Applications)

    J. Martín Ramírez (editor), Bartolomé Bauzá-Abril (editor), 2021
    PDF
    Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts (Advanced Sciences and Technologies for Security Applications)

    Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts (Advanced Sciences and Technologies for Security Applications)

    Juan Cayón Peña (editor), 2022
    EPUB
    Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107)

    Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107)

    Yingying Chen (editor), Jie Wu (editor), Paul Yu (editor), Xiaogang Wang (editor), 2024
    PDF
    Transnational Migration and Human Security: The Migration-Development-Security Nexus

    Transnational Migration and Human Security: The Migration-Development-Security Nexus

    Thanh-Dam Truong, Des Gasper (auth.), Thanh-Dam Truong, Des Gasper (eds.), 2011
    PDF
    A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Environment

    A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Environment

    Jay Hakes, 2008
    |< ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.