ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۳۰ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
    PDF
    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
    PDF
    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
    PDF
    Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

    Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

    Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.), 2007
    DJVU
    Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings

    Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings

    Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
    PDF
    ACM transactions on information and systems security (February)

    ACM transactions on information and systems security (February)

    2005
    PDF
    Certified Information Systems Security Professional. Student Guide

    Certified Information Systems Security Professional. Student Guide

    2005
    PDF
    International Control of Tritium for Nuclear Nonproliferation and Disarmament (Science and Global Security Monograph Series)

    International Control of Tritium for Nuclear Nonproliferation and Disarmament (Science and Global Security Monograph Series)

    Martin B. Kalinowski, 2004
    PDF
    International Control of Tritium for Nuclear Nonproliferation and Disarmament (Science and Global Security Monograph Series)

    International Control of Tritium for Nuclear Nonproliferation and Disarmament (Science and Global Security Monograph Series)

    Martin B. Kalinowski, 2004
    PDF
    Access Control Systems: Security, Identity Management and Trust Models

    Access Control Systems: Security, Identity Management and Trust Models

    Messaoud Benantar, 2005
    PDF
    21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention

    21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention

    Randall I. Atlas, 2008
    PDF
    Biofuels, Land Grabbing and Food Security in Africa

    Biofuels, Land Grabbing and Food Security in Africa

    Prosper B. Matondi, Kjell Havnevik, Atakilte Beyene, 2011
    PDF
    Inter-Arab Alliances: Regime Security and Jordanian Foreign Policy

    Inter-Arab Alliances: Regime Security and Jordanian Foreign Policy

    Curtis R. Ryan, 2009
    PDF
    Abraham Epstein: The Forgotten Father of Social Security

    Abraham Epstein: The Forgotten Father of Social Security

    Pierre Epstein, 2007
    PDF
    Corporate Governance and Resource Security in China: The Transformation of China's Global Resources Companies

    Corporate Governance and Resource Security in China: The Transformation of China's Global Resources Companies

    Xinting Jia, Roman Tomasic, 2009
    PDF
    The embassy of the future recommendations for the design of future U.S. embassy buildings

    The embassy of the future recommendations for the design of future U.S. embassy buildings

    Committee on Research for the Security of Future U.S. Embassy Buildings, Building Research Board, Commission on Engineering and Technical Systems, National Research Council., 1986
    PDF
    A Practical Guide to Managing Information Security

    A Practical Guide to Managing Information Security

    Steve Purser, 2004
    PDF
    A Practical Guide to Managing Information Security (Artech House Technology Management Library)

    A Practical Guide to Managing Information Security (Artech House Technology Management Library)

    Steve Purser, 2004
    PDF
    AAA Identity Management Security

    AAA Identity Management Security

    Vivek Santuka, Premdeep Banga, Brandon J. Carroll, 2010
    PDF
    Addicted to Oil: America's Relentless Drive for Energy Security

    Addicted to Oil: America's Relentless Drive for Energy Security

    Ian Rutledge, 2005
    PDF
    Brittle Power: Energy Strategy for National Security

    Brittle Power: Energy Strategy for National Security

    Hunter Lovins, Amory B. Lovins, 2001
    CHM
    19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    Michael Howard, David LeBlanc, John Viega, 2005
    PDF
    24 Deadly Sins of Software Security Programming Flaws and How to Fix Them

    24 Deadly Sins of Software Security Programming Flaws and How to Fix Them

    Michael Howard, David LeBlanc, and John Viega, 2009
    PDF
    24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    Michael Howard, David LeBlanc, John Viega, 2009
    PDF
    24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

    Michael Howard, David LeBlanc, John Viega, 2009
    |< ۲۵ ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.