ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۳۰۴ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

    Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

    Arjen K. Lenstra, 2002
    PDF
    Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

    Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

    Frank Siepmann, 2013
    PDF
    An Information Security Handbook

    An Information Security Handbook

    John M. D. Hunter BA (Hons), 2001
    PDF
    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Ueli Maurer (auth.), 2010
    PDF
    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Ueli Maurer (auth.), 2010
    PDF
    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Josep M. Miret, 2010
    PDF
    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Josep M. Miret, 2010
    PDF
    Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings

    Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings

    Facchinetti Gisella, 2003
    PDF
    Extreme Hydrological Events: New Concepts for Security

    Extreme Hydrological Events: New Concepts for Security

    O.F. Vasiliev, 2007
    PDF
    Extreme Hydrological Events: New Concepts for Security

    Extreme Hydrological Events: New Concepts for Security

    Vasiliev O.F., 2007
    PDF
    Extreme Hydrological Events: New Concepts for Security (NATO Science Series: IV: Earth and Environmental Sciences)

    Extreme Hydrological Events: New Concepts for Security (NATO Science Series: IV: Earth and Environmental Sciences)

    O.F. Vasiliev, 2007
    PDF
    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Assane Gueye, 2010
    PDF
    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Assane Gueye, 2010
    PDF
    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Joseph Y. Halpern (auth.), 2011
    PDF
    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Joseph Y. Halpern (auth.), 2011
    PDF
    Security, Identity and Interests: A Sociology of International Relations (Cambridge Studies in International Relations)

    Security, Identity and Interests: A Sociology of International Relations (Cambridge Studies in International Relations)

    Bill McSweeney, 1999
    PDF
    Computer architecture and security: fundamentals of designing secure computer systems

    Computer architecture and security: fundamentals of designing secure computer systems

    Shuangbao (Paul) Wang, 2013
    PDF
    Security Metrics: Replacing Fear, Uncertainty, and Doubt

    Security Metrics: Replacing Fear, Uncertainty, and Doubt

    Andrew Jaquith, 2007
    PDF
    Computer Security

    Computer Security

    John M. Carroll (Auth.), 1987
    PDF
    It Security Project Management Handbook

    It Security Project Management Handbook

    S Snedaker, 2006
    PDF
    IT Security Project Management Handbook

    IT Security Project Management Handbook

    SSnedaker
    PDF
    Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

    Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II

    Tetsu Iwata, 2015
    PDF
    Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I

    Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I

    Tetsu Iwata, 2015
    PDF
    CIW: Security Professional Study Guide (Exam 1D0-470)

    CIW: Security Professional Study Guide (Exam 1D0-470)

    James Stanger
    PDF
    Examwise for Ciw Security Professional: Exam 1d0-470

    Examwise for Ciw Security Professional: Exam 1d0-470

    Chad M. Bayer
    |< ۲۹۹ ۳۰۰ ۳۰۱ ۳۰۲ ۳۰۳ ۳۰۴ ۳۰۵ ۳۰۶ ۳۰۷ ۳۰۸ ۳۰۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.