ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۳۱ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Security Science: The Theory and Practice of Security

    Security Science: The Theory and Practice of Security

    Clifton Smith, 2013
    PDF
    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Barbara Simons (auth.), 2005
    PDF
    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Computer Security – ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

    Barbara Simons (auth.), 2005
    PDF
    Security Fundamentals for E-Commerce (Artech House Computer Security Series)

    Security Fundamentals for E-Commerce (Artech House Computer Security Series)

    Vesna Hassler, 2002
    PDF
    Increasing Seismic Safety by Combining Engineering Technologies and Seismological Data (NATO Science for Peace and Security Series C: Environmental Security)

    Increasing Seismic Safety by Combining Engineering Technologies and Seismological Data (NATO Science for Peace and Security Series C: Environmental Security)

    Marco Mucciarelli, 2008
    PDF
    Risk analysis, dam safety, dam security, and critical infrastructure management : proceedings of the 3rd International Forum on Risk Analysis, Dam Safety, Dam Security, and Critical Infrastructure Management (3IWRDD-Forum), Valencia, Spain, 17-18 October 2011

    Risk analysis, dam safety, dam security, and critical infrastructure management : proceedings of the 3rd International Forum on Risk Analysis, Dam Safety, Dam Security, and Critical Infrastructure Management (3IWRDD-Forum), Valencia, Spain, 17-18 October 2011

    Ignacio Escuder-Bueno, 2012
    PDF
    Challenges in Radiation Protection and Nuclear Safety Regulation of the Nuclear Legacy (NATO Science for Peace and Security Series C: Environmental Security)

    Challenges in Radiation Protection and Nuclear Safety Regulation of the Nuclear Legacy (NATO Science for Peace and Security Series C: Environmental Security)

    Malgorzata K. Sneve, 2008
    PDF
    Swords and Sustenance: The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security)

    Swords and Sustenance: The Economics of Security in Belarus and Ukraine (American Academy Studies in Global Security)

    Robert Legvold, 2004
    PDF
    European Security in the Twenty-First Century: The Challenge of Multipolarity (Contemporary Security Studies)

    European Security in the Twenty-First Century: The Challenge of Multipolarity (Contemporary Security Studies)

    Hyde-Price, 2007
    PDF
    Critique, Security and Power: The Political Limits to Emancipatory Approaches (Routledge Critical Security Studies)

    Critique, Security and Power: The Political Limits to Emancipatory Approaches (Routledge Critical Security Studies)

    Tara McCormack, 2009
    PDF
    Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

    Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

    Cecilia S. Gal, 2009
    PDF
    Computer Security – ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

    Computer Security – ESORICS 2007: 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

    Michael K. Reiter (auth.), 2007
    PDF
    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Maciej Grześkowiak (auth.), 2008
    PDF
    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Advances in Information and Computer Security: Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings

    Maciej Grześkowiak (auth.), 2008
    PDF
    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

    Mirosław Kutyłowski, 2014
    PDF
    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

    Mirosław Kutyłowski, 2014
    PDF
    Multicast and Group Security (Artech House Computer Security Series)

    Multicast and Group Security (Artech House Computer Security Series)

    Thomas Hardjono, 2003
    PDF
    Multicast and Group Security (Artech House Computer Security Series)

    Multicast and Group Security (Artech House Computer Security Series)

    Thomas Hardjono, 2003
    PDF
    Security for Telecommunications Networks (Advances in Information Security)

    Security for Telecommunications Networks (Advances in Information Security)

    Patrick Traynor, 2008
    PDF
    The Lucent Library of Homeland Security - A Vulnerable America: An Overview of National Security

    The Lucent Library of Homeland Security - A Vulnerable America: An Overview of National Security

    Geoffrey A. Campbell, 2007
    PDF
    Virus Diseases and Crop Biosecurity (NATO Science for Peace and Security Series C: Environmental Security)

    Virus Diseases and Crop Biosecurity (NATO Science for Peace and Security Series C: Environmental Security)

    Ian Cooper, 2006
    PDF
    Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23rd – 24th September 1996

    Communications and Multimedia Security II: Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23rd – 24th September 1996

    Patrick Horster (eds.), 1996
    PDF
    Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

    Security and Persistence: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

    Roger M. Needham (auth.), 1990
    PDF
    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Gene Tsudik, 2008
    PDF
    Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

    Roger Dingledine, 2009
    |< ۲۶ ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.