ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۲۹۲ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    EPUB
    India's Strategic Culture: The Making of National Security Policy

    India's Strategic Culture: The Making of National Security Policy

    Shrikant Paranjpe, 2016
    EPUB
    Food Security and Poverty in Asia and the Pacific: Key Challenges and Policy Issues

    Food Security and Poverty in Asia and the Pacific: Key Challenges and Policy Issues

    Asian Development Bank, 2012
    EPUB
    Reinventing Regional Security Institutions in Asia and Africa: Power Shifts, Ideas, and Institutional Change

    Reinventing Regional Security Institutions in Asia and Africa: Power Shifts, Ideas, and Institutional Change

    Kei Koga, 2016
    EPUB
    Kuwait: Recovery and Security After the Gulf War

    Kuwait: Recovery and Security After the Gulf War

    Anthony H. Cordesman, 1997
    EPUB
    Why do people migrate? : labour market security and migration decisions

    Why do people migrate? : labour market security and migration decisions

    Maciej Duszczyk, 2019
    EPUB
    Public Security and Governance in Contemporary China

    Public Security and Governance in Contemporary China

    Mingjun Zhang; Xinye Wu, 2017
    EPUB
    Japan's Economic Power and Security: Japan and North Korea

    Japan's Economic Power and Security: Japan and North Korea

    Christopher W. Hughes, 1999
    EPUB
    Multilateral Security and ESDP Operations

    Multilateral Security and ESDP Operations

    Fulvio Attinà, 2010
    EPUB
    The Future of Global Competition: Ontological Security Narratives in Chinese, Russian, Venezuelan, and Iranian Media

    The Future of Global Competition: Ontological Security Narratives in Chinese, Russian, Venezuelan, and Iranian Media

    Robert Hinck; Asya Cooley; Skye C Cooley; Sara Kitsch, 2021
    EPUB
    Government of Peace: Social Governance, Security and the Problematic of Peace

    Government of Peace: Social Governance, Security and the Problematic of Peace

    Ranabir Samaddar, 2016
    PDF
    Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)

    Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)

    Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor), 2022
    RAR
    Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)

    Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)

    Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor), 2022
    EPUB
    Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)

    Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)

    Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor), 2022
    PDF
    Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301)

    Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301)

    Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor), 2022
    PDF
    Security Operations Management

    Security Operations Management

    Robert McCrie, Seungmug Lee, 2022
    PDF
    Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)

    Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)

    Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor), 2022
    PDF
    Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

    Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

    Frank J. Furrer, 2022
    EPUB
    Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

    Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

    Frank J. Furrer, 2022
    RAR
    Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

    Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development

    Frank J. Furrer, 2022
    PDF
    Legitimacy, Peace Operations and Global-Regional Security: The African Union-United Nations Partnership in Darfur

    Legitimacy, Peace Operations and Global-Regional Security: The African Union-United Nations Partnership in Darfur

    Linnea Gelot, 2012
    EPUB
    Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture

    Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture

    Sasha Kranjac, 2022
    EPUB
    Revisiting Henderson poverty, social security and basic income

    Revisiting Henderson poverty, social security and basic income

    Peter Saunders (editor), 2019
    PDF
    OAuth 2.0 Cookbook: Protect your web applications using Spring Security

    OAuth 2.0 Cookbook: Protect your web applications using Spring Security

    Adolfo Eloy Nascimento, 2017
    EPUB
    Ideology and Mass Killing: The Radicalized Security Politics of Genocides and Deadly Atrocities

    Ideology and Mass Killing: The Radicalized Security Politics of Genocides and Deadly Atrocities

    Jonathan Leader Maynard, 2022
    PDF
    The Fantasy Trip. Security Station

    The Fantasy Trip. Security Station

    John W. Colbert, 1980
    |< ۲۸۷ ۲۸۸ ۲۸۹ ۲۹۰ ۲۹۱ ۲۹۲ ۲۹۳ ۲۹۴ ۲۹۵ ۲۹۶ ۲۹۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.