ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۲۹۴ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Certification and Security in Health-Related Web Applications: Concepts and Solutions

    Certification and Security in Health-Related Web Applications: Concepts and Solutions

    Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis, 2010
    PDF
    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
    PDF
    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
    PDF
    Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

    Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

    R. Sekar (auth.), Yingjiu Li (eds.), 2011
    PDF
    Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

    Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

    Leendert van der Torre (auth.), Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.), 2012
    PDF
    Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings

    Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings

    Vijay Atluri, Günther Pernul (eds.), 2014
    PDF
    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
    PDF
    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
    PDF
    Developer's Guide to Web Application Security

    Developer's Guide to Web Application Security

    Michael Cross, 2007
    PDF
    Developer's Guide to Web Application Security

    Developer's Guide to Web Application Security

    Michael Cross, 2007
    PDF
    Developer's guide to web application security

    Developer's guide to web application security

    Michael Cross, 2007
    PDF
    Developer's Guide to Web Application Security

    Developer's Guide to Web Application Security

    Michael Cross, 2007
    PDF
    Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings

    Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings

    Tran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai (eds.), 2014
    CHM
    Java Security Solutions

    Java Security Solutions

    Rich Helton, Johennie Helton, 2002
    PDF
    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    Tobias Klein, 2011
    EPUB
    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    Tobias Klein, 2011
    PDF
    Building Global Security Through Cooperation: Annals of Pugwash 1989

    Building Global Security Through Cooperation: Annals of Pugwash 1989

    Richard Garwin (auth.), Professor Dr. Joseph Rotblat, Professor John P. Holdren (eds.), 1990
    PDF
    A Theory of Security Strategy for Our Time: Defensive Realism

    A Theory of Security Strategy for Our Time: Defensive Realism

    Shiping Tang, 2010
    PDF
    A Theory of Security Strategy for Our Time: Defensive Realism

    A Theory of Security Strategy for Our Time: Defensive Realism

    Shiping Tang (auth.), 2010
    PDF
    Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science)

    Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science)

    Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
    PDF
    Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

    Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

    Wen-Chung Kuo (auth.), Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.), 2009
    PDF
    Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

    Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

    Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.), 2015
    DJVU
    Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

    Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

    Prof. Dr. B. De Schutter (auth.), Bart Preneel, René Govaerts, Joos Vandewalle (eds.), 1993
    PDF
    China's  Rising Sea Power (The PLA Navy's Submarine Challenge) (Asian Security Studies)

    China's Rising Sea Power (The PLA Navy's Submarine Challenge) (Asian Security Studies)

    Peter Howarth, 2006
    PDF
    CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

    CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

    Ido Dubrawsky, 2009
    |< ۲۸۹ ۲۹۰ ۲۹۱ ۲۹۲ ۲۹۳ ۲۹۴ ۲۹۵ ۲۹۶ ۲۹۷ ۲۹۸ ۲۹۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.