ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۳۱۳ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

    Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

    Robert H. Deng, 2008
    PDF
    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Mihir Bellare (auth.), 1999
    PDF
    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Mihir Bellare (auth.), 1999
    PDF
    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Davrondzhon Gafurov, 2010
    PDF
    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Davrondzhon Gafurov, 2010
    PDF
    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Hsiang-Cheh Huang, 2009
    PDF
    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Hsiang-Cheh Huang, 2009
    PDF
    Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

    Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

    Brian Contos, 2007
    PDF
    Security Log Management : Identifying Patterns in the Chaos

    Security Log Management : Identifying Patterns in the Chaos

    Jacob Babbin Dave Kleiman Everett F. Carter Jr. Jeremy Faircloth Mark Burnett Esteban Gutierrez, 2006
    PDF
    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Thomas Raffetseder, 2007
    PDF
    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Thomas Raffetseder, 2007
    PDF
    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Shai Halevi (auth.), 2008
    PDF
    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Shai Halevi (auth.), 2008
    PDF
    The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition

    The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition

    Gerald L. Kovacich, 2003
    PDF
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    Chris Anley, 2007
    PDF
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    Chris Anley, 2007
    PDF
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

    Chris Anley, 2007
    PDF
    Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

    Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

    Jan Vossaert, 2010
    PDF
    Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers

    Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers

    Peter Teufl, 2012
    PDF
    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

    Andreas Pfitzmann (auth.), 2008
    PDF
    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

    Andreas Pfitzmann (auth.), 2008
    PDF
    Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings

    Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings

    David Naccache, 2014
    PDF
    Cognitive Radio Networking and Security A Game Theoretic View

    Cognitive Radio Networking and Security A Game Theoretic View

    K. J. Ray Liu, 2010
    PDF
    Pattern Analysis, Intelligent Security and the Internet of Things

    Pattern Analysis, Intelligent Security and the Internet of Things

    Ajith Abraham, 2015
    PDF
    Energy supply and pipeline transportation : challenges and opportunities : an overview of energy supply security and pipeline transportation

    Energy supply and pipeline transportation : challenges and opportunities : an overview of energy supply security and pipeline transportation

    Mohitpour, 2008
    |< ۳۰۸ ۳۰۹ ۳۱۰ ۳۱۱ ۳۱۲ ۳۱۳ ۳۱۴ ۳۱۵ ۳۱۶ ۳۱۷ ۳۱۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.