ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۳ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    EPUB
    CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

    CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

    Glen D. Singh, Michael Vinod, Vijay Anandh, 2018
    PDF
    Cyber Security: ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners

    Cyber Security: ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners

    David White
    EPUB
    Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

    Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

    Pushpa Herath, 2021
    PDF
    Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

    Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

    Pushpa Herath, 2021
    EPUB
    Social Security Handbook 2014: Overview of Social Security Programs

    Social Security Handbook 2014: Overview of Social Security Programs

    Social Security Administration, 2014
    PDF
    Coupled Site and Soil-Structure Interaction Effects with Application to Seismic Risk Mitigation (NATO Science for Peace and Security Series C: Environmental Security)

    Coupled Site and Soil-Structure Interaction Effects with Application to Seismic Risk Mitigation (NATO Science for Peace and Security Series C: Environmental Security)

    Tom Schanz, Roumen Iankov, 2009
    PDF
    Air, Water and Soil Quality Modelling for Risk and Impact Assessment (NATO Science for Peace and Security Series C: Environmental Security)

    Air, Water and Soil Quality Modelling for Risk and Impact Assessment (NATO Science for Peace and Security Series C: Environmental Security)

    Adolf Ebel, Teimuraz Davitashvili, 2007
    PDF
    Air, Water and Soil Quality Modelling for Risk and Impact Assessment (NATO Science for Peace and Security Series C: Environmental Security)

    Air, Water and Soil Quality Modelling for Risk and Impact Assessment (NATO Science for Peace and Security Series C: Environmental Security)

    Adolf Ebel, Teimuraz Davitashvili, 2007
    PDF
    BS ISO IEC 27005:2008  Information technology -- Security techniques -- Information security risk management

    BS ISO IEC 27005:2008 Information technology -- Security techniques -- Information security risk management

    BSI
    PDF
    BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 Information technology. Security techniques. Code of practice for information security management

    BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 Information technology. Security techniques. Code of practice for information security management

    BSI, 2007
    PDF
    BS ISO/IEC 27035:2011 Information technology. Security techniques. Information security incident management

    BS ISO/IEC 27035:2011 Information technology. Security techniques. Information security incident management

    BSi, 2011
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    Praphul Chandra, 2005
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    Praphul Chandra, 2005
    PDF
    Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Gal Luft, Anne Korin, 2009
    PDF
    Energy Security in Asia (Routledge Security in Asia Pacific Series)

    Energy Security in Asia (Routledge Security in Asia Pacific Series)

    Michael Wesley, 2007
    PDF
    Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report

    Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report

    Committee on the Safety and Security of Commercial Spent Nuclear Fuel Storage, National Research Council, 2006
    PDF
    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Committee on Balancing Scientific Openness and National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 1999
    PDF
    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories

    Committee on Balancing Scientific Openness and National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 1999
    PDF
    Biotechnology, Security and the Search for Limits: An Inquiry into Research and Methods (New Security Challenges)

    Biotechnology, Security and the Search for Limits: An Inquiry into Research and Methods (New Security Challenges)

    Brian Rappert, 2007
    PDF
    Advanced Combustion and Aerothermal Technologies: Environmental Protection and Pollution Reductions (NATO Science for Peace and Security Series C: Environmental Security)

    Advanced Combustion and Aerothermal Technologies: Environmental Protection and Pollution Reductions (NATO Science for Peace and Security Series C: Environmental Security)

    Nick Syred, Artem Khalatov, 2007
    PDF
    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Ari Takanen, Jared DeMott, Charlie Miller, 2008
    PDF
    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Ari Takanen, Jared DeMott, Charlie Miller, 2008
    PDF
    Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, ... Computer Science / Security and Cryptology)

    Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, ... Computer Science / Security and Cryptology)

    Mitsuri Matsui, 2009
    PDF
    Doing Security (Crime Prevention and Security Management)

    Doing Security (Crime Prevention and Security Management)

    Mark Button, 2009
    PDF
    Doing Security (Crime Prevention and Security Management)

    Doing Security (Crime Prevention and Security Management)

    Mark Button, 2009
    |< ۱ ۲ ۳ ۴ ۵ ۶ ۷ ۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.