ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۳۴ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Changing Transatlantic Security Relations: Do the U.S, the EU and Russia Form a New Strategic Triangle?

    Changing Transatlantic Security Relations: Do the U.S, the EU and Russia Form a New Strategic Triangle?

    Jan Hallenberg, Hakan Karlsson, 2006
    PDF
    Death Orders: The Vanguard of Modern Terrorism in Revolutionary Russia (Praeger Security International)

    Death Orders: The Vanguard of Modern Terrorism in Revolutionary Russia (Praeger Security International)

    Anna Geifman, 2010
    PDF
    On the Edge: Ukrainian-Central European-Russian Security Triangle

    On the Edge: Ukrainian-Central European-Russian Security Triangle

    Margarita Mercedes Balmaceda, 2001
    PDF
    Security analysis

    Security analysis

    Benjamin Graham, David Dodd, Warren Buffett, 2008
    PDF
    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Taizo Shirai, Bart Preneel (auth.), Pil Joong Lee (eds.), 2004
    PDF
    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Pascal Paillier, Damien Vergnaud (auth.), Bimal Roy (eds.), 2005
    PDF
    Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings (Lecture ... Computer Science / Security and Cryptology)

    Advances in Cryptology - CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings (Lecture ... Computer Science / Security and Cryptology)

    Shai Halevi, 2009
    PDF
    Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science / Security and Cryptology)

    Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science / Security and Cryptology)

    Henri Gilbert, 2010
    DJVU
    Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

    Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

    Atsuko Miyaji (auth.), Kwangjo Kim, Tsutomu Matsumoto (eds.), 1996
    PDF
    Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

    Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

    Alex Biryukov, Adi Shamir (auth.), Tatsuaki Okamoto (eds.), 2000
    PDF
    Advances in Information Security and Its Application.. Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009

    Advances in Information Security and Its Application.. Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009

    Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
    PDF
    Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors

    Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors

    Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele, 2007
    PDF
    Aviation Security Law

    Aviation Security Law

    Dr. Ruwantissa Abeyratne (auth.), 2010
    PDF
    Career Opportunities In Law Enforcement, Security And Protective Services, 2nd Edition

    Career Opportunities In Law Enforcement, Security And Protective Services, 2nd Edition

    Susan Echaore-McDavid, 2005
    PDF
    A Matter of Security: The Application of Attachment Theory to Forensic Psychiatry and Psychotherapy (Forensic Focus)

    A Matter of Security: The Application of Attachment Theory to Forensic Psychiatry and Psychotherapy (Forensic Focus)

    Friedemann Pf¿fflin, Gwen Adshead, 2003
    PDF
    American National Security and Civil Liberties in an Era of Terrorism

    American National Security and Civil Liberties in an Era of Terrorism

    David B. Cohen, John W. Wells, 2004
    PDF
    An Introduction to Military Ethics: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    An Introduction to Military Ethics: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Bill Rhodes, 2009
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2002
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2002
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Error Correcting Coding and Security for Data Networks : Analysis of the Superchannel Concept

    Error Correcting Coding and Security for Data Networks : Analysis of the Superchannel Concept

    GrigoriiKabatiansky, 2005
    PDF
    A Classical Introduction to Cryptography: Applications for Communications Security

    A Classical Introduction to Cryptography: Applications for Communications Security

    Serge Vaudenay, 2005
    PDF
    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Assane Gueye, Jean C. Walrand, Venkat Anantharam (auth.), Tansu Alpcan, Levente Buttyán, John S. Baras (eds.), 2010
    |< ۲۹ ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.