ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۳۰ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    The Distributional Aspects of Social Security and Social Security Reform (National Bureau of Economic Research Conference Report)

    The Distributional Aspects of Social Security and Social Security Reform (National Bureau of Economic Research Conference Report)

    Martin Feldstein, 2002
    PDF
    Dangerous Pollutants (Xenobiotics) in Urban Water Cycle (NATO Science for Peace and Security Series C: Environmental Security)

    Dangerous Pollutants (Xenobiotics) in Urban Water Cycle (NATO Science for Peace and Security Series C: Environmental Security)

    Petr Hlavinek, 2007
    PDF
    Water Supply in Emergency Situations (NATO Science for Peace and Security Series C: Environmental Security)

    Water Supply in Emergency Situations (NATO Science for Peace and Security Series C: Environmental Security)

    Yair Sharan, 2007
    PDF
    Water Treatment Technologies for the Removal of High-Toxity Pollutants (NATO Science for Peace and Security Series C: Environmental Security)

    Water Treatment Technologies for the Removal of High-Toxity Pollutants (NATO Science for Peace and Security Series C: Environmental Security)

    Miroslava Václavíková, 2009
    CHM
    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Jothy Rosenberg, 2004
    EPUB
    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

    Jothy Rosenberg, 2004
    PDF
    Commissions of Inquiry and National Security: Comparative Approaches (Praeger Security International)

    Commissions of Inquiry and National Security: Comparative Approaches (Praeger Security International)

    Stuart Farson, 2010
    PDF
    Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

    Comprehensive Security in Asia: Views from Asia and the West on a Changing Security Environment

    Kurt W. Radtke, 2000
    EPUB
    The Security Agencies of the United States. How the CIA, FBI, NSA, and Homeland Security Keep Us Safe

    The Security Agencies of the United States. How the CIA, FBI, NSA, and Homeland Security Keep Us Safe

    Tom Streissguth, 2013
    PDF
    Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment

    Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment

    Darrell Clifton, 2012
    PDF
    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Jaideep Vaidya (auth.), 2010
    PDF
    Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

    Bioterror: Anthrax, Influenza, and the Future of Public Health Security (Praeger Security International)

    R. William Johnstone, 2008
    PDF
    Private Security Companies: Transforming Politics and Security in the Czech Republic

    Private Security Companies: Transforming Politics and Security in the Czech Republic

    Oldřich Bureš (auth.), 2015
    PDF
    Harbour Protection Through Data Fusion Technologies (NATO Science for Peace and Security Series C: Environmental Security)

    Harbour Protection Through Data Fusion Technologies (NATO Science for Peace and Security Series C: Environmental Security)

    Elisa Shahbazian, 2008
    PDF
    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Quality Of Protection: Security Measurements and Metrics (Advances in Information Security)

    Dieter Gollmann, 2006
    PDF
    European Security, Terrorism and Intelligence: Tackling New Security Challenges in Europe

    European Security, Terrorism and Intelligence: Tackling New Security Challenges in Europe

    Christian Kaunert, 2013
    PDF
    Security, Strategy, and Critical Theory (Critical Security Studies)

    Security, Strategy, and Critical Theory (Critical Security Studies)

    Richard Jones, 1999
    PDF
    Security Software Development: Assessing and Managing Security Risks

    Security Software Development: Assessing and Managing Security Risks

    Douglas A. AshbaughCISSP, 2008
    PDF
    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Merje Kuus, 2007
    PDF
    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Geopolitics Reframed: Security and Identity in Europe\'s Eastern Enlargement (New Visions in Security)

    Merje Kuus, 2007
    PDF
    Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals

    Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals

    Randy Harrison, 2014
    PDF
    Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

    Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

    Keisuke Tanaka, 2015
    PDF
    Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

    Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

    Maki Yoshida, 2014
    PDF
    Security for business professionals : how to plan, implement, and manage your company's security program

    Security for business professionals : how to plan, implement, and manage your company's security program

    Bradley A Wayland, 2014
    PDF
    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict

    Corporate Security Responsibility?: Corporate Governance Contributions to Peace and Security in Zones of Conflict

    Nicole Deitelhoff, 2010
    |< ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.