ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۸۳ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    War, Conflict and Security in Japan and Asia Pacific, 1941-1952: The Writings of Louis Allen

    War, Conflict and Security in Japan and Asia Pacific, 1941-1952: The Writings of Louis Allen

    Louis Allen, 2011
    PDF
    Cyber Security and Digital Forensics: Challenges and Future Trends

    Cyber Security and Digital Forensics: Challenges and Future Trends

    Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le, 2022
    PDF
    Ethical Issues In Covert, Security And Surveillance Research

    Ethical Issues In Covert, Security And Surveillance Research

    Ron Iphofen, Dónal O'Mathúna, 2022
    PDF
    Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation

    Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation

    Myriam Dunn Cavelty, Andreas Wenger, 2022
    PDF
    UN Sanctions and Conflict: Responding to Peace and Security Threats

    UN Sanctions and Conflict: Responding to Peace and Security Threats

    Andrea Charron, 2011
    PDF
    Human Security in Turkey: Challenges for the 21st century

    Human Security in Turkey: Challenges for the 21st century

    Alpaslan Özerdem (editor), Füsun Özerdem (editor), 2013
    EPUB
    Internet of Healthcare Things: Machine Learning for Security and Privacy (Machine Learning in Biomedical Science and Healthcare Informatics)

    Internet of Healthcare Things: Machine Learning for Security and Privacy (Machine Learning in Biomedical Science and Healthcare Informatics)

    Kavita Sharma (editor), Yogita Gigras (editor), Vishnu Sharma (editor), D. Jude Hemanth (editor), Ramesh Chandra Poonia (editor), 2022
    PDF
    Internet of Healthcare Things: Machine Learning for Security and Privacy (Machine Learning in Biomedical Science and Healthcare Informatics)

    Internet of Healthcare Things: Machine Learning for Security and Privacy (Machine Learning in Biomedical Science and Healthcare Informatics)

    Kavita Sharma (editor), Yogita Gigras (editor), Vishnu Sharma (editor), D. Jude Hemanth (editor), Ramesh Chandra Poonia (editor), 2022
    EPUB
    Microsoft Sentinel in Action: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions, 2nd Edition

    Microsoft Sentinel in Action: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions, 2nd Edition

    Richard Diver, Gary Bushey, John Perkins, 2022
    PDF
    Microsoft Sentinel in Action: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions, 2nd Edition

    Microsoft Sentinel in Action: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions, 2nd Edition

    Richard Diver, Gary Bushey, John Perkins, 2022
    EPUB
    Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

    Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

    Shabaz Darr, Viktor Hedberg, 2022
    EPUB
    Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

    Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

    Yoram Orzach, 2022
    PDF
    Behavioral Synthesis for Hardware Security

    Behavioral Synthesis for Hardware Security

    Srinivas Katkoori (editor), Sheikh Ariful Islam (editor), 2022
    PDF
    Changing Security Paradigm in West Asia: Regional and International Responses

    Changing Security Paradigm in West Asia: Regional and International Responses

    Meena Singh Roy (editor), M. Muddassir Quamar (editor), 2022
    PDF
    Space Policy in Developing Countries: The Search for Security and Development on the Final Frontier

    Space Policy in Developing Countries: The Search for Security and Development on the Final Frontier

    Robert C. Harding, 2012
    PDF
    Cryptography and Network Security: Principles and Practice

    Cryptography and Network Security: Principles and Practice

    William Stallings, 2019
    PDF
    Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations

    Disarmament Diplomacy and Human Security: Regimes, Norms and Moral Progress in International Relations

    Denise Garcia, 2011
    PDF
    Protective Operations: A Handbook for Security and Law Enforcement

    Protective Operations: A Handbook for Security and Law Enforcement

    Glenn McGovern, 2011
    EPUB
    Agile Security Operations: Engineering for agility in cyber defense, detection, and response

    Agile Security Operations: Engineering for agility in cyber defense, detection, and response

    Hinne Hettema, 2022
    PDF
    Agile Security Operations: Engineering for agility in cyber defense, detection, and response

    Agile Security Operations: Engineering for agility in cyber defense, detection, and response

    Hinne Hettema, 2022
    PDF
    Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings (Communications in Computer and Information Science)

    Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings (Communications in Computer and Information Science)

    Gang Wang (editor), Arridhana Ciptadi (editor), Ali Ahmadzadeh (editor), 2021
    PDF
    Antarctic Security in the Twenty-First Century: Legal and Policy Perspectives

    Antarctic Security in the Twenty-First Century: Legal and Policy Perspectives

    Alan D. Hemmings, Donald R. Rothwell, Karen N. Scott, 2012
    PDF
    Privacy, Security And Forensics in The Internet of Things (IoT)

    Privacy, Security And Forensics in The Internet of Things (IoT)

    Reza Montasari (editor), Fiona Carroll (editor), Ian Mitchell (editor), Sukhvinder Hara (editor), Rachel Bolton-King (editor), 2022
    PDF
    The Handbook of Communication and Security

    The Handbook of Communication and Security

    Bryan C. Taylor (editor), Hamilton Bean (editor), 2019
    PDF
    Playing the Identity Card: Surveillance, Security and Identification in Global Perspective

    Playing the Identity Card: Surveillance, Security and Identification in Global Perspective

    Colin J Bennett (editor), David Lyon (editor), 2008
    |< ۲۷۸ ۲۷۹ ۲۸۰ ۲۸۱ ۲۸۲ ۲۸۳ ۲۸۴ ۲۸۵ ۲۸۶ ۲۸۷ ۲۸۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.