ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Cryptography، صفحه ۳ از ۳۷ در بین ۹۱۳ کتاب.
    PDF
    Public Key Cryptography – PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings

    Public Key Cryptography – PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings

    Alexander May, 2009
    PDF
    Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

    Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

    Jonathan Katz (eds.), 2015
    PDF
    Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings

    Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings

    Yevgeniy Dodis, 2013
    PDF
    Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I

    Public-Key Cryptography – PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I

    Serge Fehr (eds.), 2017
    PDF
    Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings

    Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings

    Salil P. Vadhan, 2007
    PDF
    Practical Cryptography in Python: Learning Correct Cryptography by Example

    Practical Cryptography in Python: Learning Correct Cryptography by Example

    Seth James Nielson, Christopher K. Monson, 2019
    EPUB
    Practical Cryptography in Python: Learning Correct Cryptography by Example

    Practical Cryptography in Python: Learning Correct Cryptography by Example

    Seth James Nielson; Christopher K. Monson, 2019
    PDF
    Cryptography Made Simple (Information Security and Cryptography)

    Cryptography Made Simple (Information Security and Cryptography)

    Nigel Smart, 2015
    PDF
    Practical Cryptography in Python: Learning Correct Cryptography by Example

    Practical Cryptography in Python: Learning Correct Cryptography by Example

    Seth James Nielson, 2019
    PDF
    Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings

    Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings

    2014
    PDF
    Next-generation cryptography algorithms explained: get to grips with new-age cryptography algorithms, protocols, and their implementation /

    Next-generation cryptography algorithms explained: get to grips with new-age cryptography algorithms, protocols, and their implementation /

    Massimo Bertaccini., 2022
    PDF
    Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I

    Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I

    Alexandra Boldyreva, Vladimir Kolesnikov, 2023
    PDF
    Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography Atlanta, GA, USA, May 7–10, 2023 Proceedings, Part II

    Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography Atlanta, GA, USA, May 7–10, 2023 Proceedings, Part II

    Alexandra Boldyreva, Vladimir Kolesnikov, 2023
    PDF
    Arithmetic, Geometry, Cryptography, and Coding Theory 2021: 18th International Conference Arithmetic, Geometry, Cryptography, and Coding Theory May 31 ... France (Contemporary Mathematics, 779)

    Arithmetic, Geometry, Cryptography, and Coding Theory 2021: 18th International Conference Arithmetic, Geometry, Cryptography, and Coding Theory May 31 ... France (Contemporary Mathematics, 779)

    Samuele Anni (editor), Valentijn Karemaker (editor), Elisa Lorenzo Garcia (editor), 2022
    PDF
    An introduction to mathematical cryptography

    An introduction to mathematical cryptography

    Jeffrey Hoffstein, Jill Pipher, J.H. Silverman, 2008
    PDF
    An Introduction to Mathematical Cryptography

    An Introduction to Mathematical Cryptography

    Jeffrey Hoffstein, Jill Pipher, J.H. Silverman, 2008
    PDF
    An introduction to mathematical cryptography

    An introduction to mathematical cryptography

    Hoffstein J., Pipher J., Silverman J., 2008
    PDF
    An introduction to mathematical cryptography

    An introduction to mathematical cryptography

    Jeffrey Hoffstein; Jill Catherine Pipher; Joseph H Silverman, 2008
    PDF
    An Introduction to Mathematical Cryptography

    An Introduction to Mathematical Cryptography

    Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman (auth.), 2014
    DJVU
    An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

    An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

    Jeffrey Hoffstein, Jill Pipher, J.H. Silverman, 2008
    PDF
    An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

    An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

    Jeffrey Hoffstein, Jill Pipher, J.H. Silverman, 2008
    PDF
    An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

    An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)

    Jeffrey Hoffstein, Jill Pipher, J.H. Silverman, 2008
    PDF
    Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

    Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

    Arkadii Slinko, 2015
    PDF
    A Classical Introduction to Cryptography - Applications for Communications Security

    A Classical Introduction to Cryptography - Applications for Communications Security

    Serge Vaudenay, 2005
    PDF
    A Classical Introduction to Cryptography: Applications for Communications Security

    A Classical Introduction to Cryptography: Applications for Communications Security

    Serge Vaudenay, 2005
    |< ۱ ۲ ۳ ۴ ۵ ۶ ۷ ۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.