ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۳۲ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France

    Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, France

    Mario Bravetti, 2005
    PDF
    Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993

    Security for Object-Oriented Systems: Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993

    Bhavani Thuraisingham, 1994
    PDF
    Workplace Security Playbook. The New Manager's Guide to Security Risk

    Workplace Security Playbook. The New Manager's Guide to Security Risk

    Bob Hayes (Eds.), 2013
    PDF
    The United States and the Security Council: Collective Security since the Cold War

    The United States and the Security Council: Collective Security since the Cold War

    Brian Frederking, 2007
    EPUB
    Security Technologies for the World Wide Web (Artech House Computer Security Series)

    Security Technologies for the World Wide Web (Artech House Computer Security Series)

    Rolf Oppliger, 1999
    EPUB
    Windows Server 2012 Security from End to Edge and Beyond  Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond  Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond. Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W. Shinder, Yuri Diogenes, 2013
    PDF
    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    MOBI
    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

    Thomas W Shinder, 2013
    PDF
    Embedded Java Security: Security for Mobile Devices

    Embedded Java Security: Security for Mobile Devices

    Mourad Debbabi, 2006
    PDF
    Embedded Java Security: Security for Mobile Devices

    Embedded Java Security: Security for Mobile Devices

    Mourad Debbabi, 2006
    PDF
    Embedded Java Security: Security for Mobile Devices

    Embedded Java Security: Security for Mobile Devices

    Mourad Debbabi, 2006
    PDF
    Embedded Java Security: Security for Mobile Devices

    Embedded Java Security: Security for Mobile Devices

    Mourad Debbabi, 2007
    PDF
    Transportation Security Against Terrorism - Volume 54 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    Transportation Security Against Terrorism - Volume 54 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    M. Tahmisoglu
    PDF
    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

    Andrzej Białas (auth.), 2005
    PDF
    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry)

    Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry)

    Janusz S. Kowalik, 2005
    PDF
    Climate Change and Security: A Gathering Storm of Global Challenges (Security and the Environment)

    Climate Change and Security: A Gathering Storm of Global Challenges (Security and the Environment)

    Christian Webersik, 2010
    EPUB
    People-Centric Security: Transforming Your Enterprise Security Culture

    People-Centric Security: Transforming Your Enterprise Security Culture

    Lance Hayden, 2015
    DJVU
    Computer security, ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992: proceedings

    Computer security, ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992: proceedings

    Yves Deswarte, 1992
    PDF
    Human Rights, Human Security, and State Security [3 volumes]: The Intersection

    Human Rights, Human Security, and State Security [3 volumes]: The Intersection

    Saul Takahashi, 2014
    PDF
    Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

    Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

    Information Security, 2008
    PDF
    Essential Computer Security. Everyone's Guide to E-mail, Internet, and Wireless Security

    Essential Computer Security. Everyone's Guide to E-mail, Internet, and Wireless Security

    Tony Bradley, 2006
    PDF
    Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

    Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

    T. Bradley, 2007
    PDF
    Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

    Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

    T. Bradley, 2007
    |< ۲۷ ۲۸ ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.