ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۸ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings

    Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings

    Steven Latré, 2015
    PDF
    European Security, Terrorism and Intelligence: Tackling New Security Challenges in Europe

    European Security, Terrorism and Intelligence: Tackling New Security Challenges in Europe

    Christian Kaunert, 2013
    PDF
    Security, Strategy, and Critical Theory (Critical Security Studies)

    Security, Strategy, and Critical Theory (Critical Security Studies)

    Richard Jones, 1999
    PDF
    Security Software Development: Assessing and Managing Security Risks

    Security Software Development: Assessing and Managing Security Risks

    Douglas A. AshbaughCISSP, 2008
    DJVU
    Local Area Network Security: Workshop LANSEC '89 European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3–6, 1989 Proceedings

    Local Area Network Security: Workshop LANSEC '89 European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3–6, 1989 Proceedings

    Kimberly E. Kirkpatrick (auth.), 1989
    PDF
    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Merje Kuus, 2007
    PDF
    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Merje Kuus, 2007
    PDF
    Security in Ad-hoc and Sensor Networks (Computer and Network Security)

    Security in Ad-hoc and Sensor Networks (Computer and Network Security)

    Raheem Beyah, 2009
    PDF
    Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals

    Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals

    Randy Harrison, 2014
    PDF
    Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

    Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

    Keisuke Tanaka, 2015
    PDF
    Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

    Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

    Maki Yoshida, 2014
    PDF
    Security for business professionals : how to plan, implement, and manage your company's security program

    Security for business professionals : how to plan, implement, and manage your company's security program

    Bradley A Wayland, 2014
    PDF
    Safety Related Issues of Spent Nuclear Fuel Storage (NATO Science for Peace and Security Series C: Environmental Security)

    Safety Related Issues of Spent Nuclear Fuel Storage (NATO Science for Peace and Security Series C: Environmental Security)

    J.D.B. Lambert, 2007
    PDF
    Embedded Java Security Security for Mobile Devices

    Embedded Java Security Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Embedded Java Security Security for Mobile Devices

    Embedded Java Security Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Embedded Java Security Security for Mobile Devices

    Embedded Java Security Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Safety and Security Engineering VI. Sixth International Conference on Safety and Security Engineering

    Safety and Security Engineering VI. Sixth International Conference on Safety and Security Engineering

    Brebbia, 2015
    PDF
    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict

    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict

    Nicole Deitelhoff, 2010
    PDF
    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict.

    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict.

    Nicole Deitelhoff, 2010
    PDF
    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Bernard Peter Robichau, 2014
    PDF
    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

    Bernard Peter Robichau (auth.), 2014
    PDF
    Reconstructing Security after Conflict: Security Sector Reform in Sierra Leone

    Reconstructing Security after Conflict: Security Sector Reform in Sierra Leone

    Paul Jackson, 2011
    PDF
    Aviation Security Management (Praeger Security International)

    Aviation Security Management (Praeger Security International)

    Andrew R. Thomas, 2008
    PDF
    Rising to the Challenge: China's Grand Strategy and International Security (Studies in Asian Security)

    Rising to the Challenge: China's Grand Strategy and International Security (Studies in Asian Security)

    Avery Goldstein, 2005
    PDF
    China's War on Terrorism: Counter-Insurgency, Politics and Internal Security (Asian Security Studies)

    China's War on Terrorism: Counter-Insurgency, Politics and Internal Security (Asian Security Studies)

    Martin I. Wayne, 2007
    |< ۲۳ ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.