ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۲۹ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    DJVU
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    Praphul Chandra, 2005
    PDF
    GSM, UMTS, 802.11 and Ad Hoc Security. Bulletproof Wireless Security

    GSM, UMTS, 802.11 and Ad Hoc Security. Bulletproof Wireless Security

    Chandra, 2005
    PDF
    Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan ... Federation for Information Processing)

    Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan ... Federation for Information Processing)

    Ryoichi Sasaki, 2005
    PDF
    Integrated Urban Water Resources Management (NATO Science for Peace and Security Series C: Environmental Security)

    Integrated Urban Water Resources Management (NATO Science for Peace and Security Series C: Environmental Security)

    Petr Hlavinek, 2006
    PDF
    Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

    Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18–20, 2009. Proceedings

    Nathan Clarke, 2009
    PDF
    Security Patterns Integrating Security and Systems Engineering

    Security Patterns Integrating Security and Systems Engineering

    Markus Schumacher, 2006
    EPUB
    Security Patterns: Integrating Security and Systems Engineering

    Security Patterns: Integrating Security and Systems Engineering

    Markus Schumacher, 2006
    MOBI
    Security Patterns: Integrating Security and Systems Engineering

    Security Patterns: Integrating Security and Systems Engineering

    Markus Schumacher, 2006
    PDF
    Scientific Support for the Decision Making in the Security Sector (Nato Science for Peace and Security)

    Scientific Support for the Decision Making in the Security Sector (Nato Science for Peace and Security)

    Ognyan Kounchev, 2007
    PDF
    HIV and Disability: Updating the Social Security Listings

    HIV and Disability: Updating the Social Security Listings

    Committee on Social Security HIV Disability Criteria, 2003
    PDF
    The United Nations, Peace and Security: From Collective Security to the Responsibility to Protect

    The United Nations, Peace and Security: From Collective Security to the Responsibility to Protect

    Ramesh Thakur, 2006
    PDF
    CISSP 100 Success Secrets - Certified Information Systems Security Professional; The Missing Exam Study, Certification Preparation and Security Application Guide

    CISSP 100 Success Secrets - Certified Information Systems Security Professional; The Missing Exam Study, Certification Preparation and Security Application Guide

    Gerard Blokdijk, 2007
    PDF
    New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa

    New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa

    John Haggerty, 2007
    PDF
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    DJVU
    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (PSI Business Security)

    Philip Alexander, 2008
    PDF
    A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)

    A Decade of Human Security: Global Governance And New Multilateralisms (Global Security in a Changing World)

    Sandra Jean Maclean, 2006
    PDF
    America, the EU and Strategic Culture: Transatlantic Security Relations after the Cold War (Contemporary Security Studies)

    America, the EU and Strategic Culture: Transatlantic Security Relations after the Cold War (Contemporary Security Studies)

    Asle Toje, 2008
    PDF
    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

    Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

    W. Krag BrotbyCISM, 2009
    PDF
    Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)

    Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust)

    Trent Jaeger, 2008
    PDF
    EISS Yearbook 1980–1981 Part II / Annuaire EISS 1980–1981 Partie II: The social security and the economic crisis Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique Travaux de l’Institut Européen de Sécurité Sociale

    EISS Yearbook 1980–1981 Part II / Annuaire EISS 1980–1981 Partie II: The social security and the economic crisis Proceedings of the European Institute for Social Security / La sécurité sociale et la crise économique Travaux de l’Institut Européen de Sécurité Sociale

    Prof. Dr. G. M. J. Veldkamp (auth.), 1982
    PDF
    Security leader insights for risk management : lessons and strategies from leading security professionals

    Security leader insights for risk management : lessons and strategies from leading security professionals

    Richard E Chase, 2014
    PDF
    Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World

    Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World

    Security,
    PDF
    Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework

    Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework

    Abraham, Ajin, 2015
    PDF
    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    S. H. (Basie) von Solms (auth.), 2010
    PDF
    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Bart Preneel (auth.), 2009
    |< ۲۴ ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.