ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۳۵ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS ... (Lecture Notes in Computer Science, 6258)

    Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS ... (Lecture Notes in Computer Science, 6258)

    Igor Kotenko (editor), Victor Skormin (editor), 2010
    PDF
    Moodle 4 Security. Enhance security, regulation, and compliance within your Moodle infrastructure

    Moodle 4 Security. Enhance security, regulation, and compliance within your Moodle infrastructure

    Ian Wild, 2024
    PDF
    Transnational Migration and Human Security: The Migration-Development-Security Nexus

    Transnational Migration and Human Security: The Migration-Development-Security Nexus

    Thanh-Dam Truong, Des Gasper (auth.), Thanh-Dam Truong, Des Gasper (eds.), 2011
    PDF
    BS ISO IEC 27005:2008  Information technology -- Security techniques -- Information security risk management

    BS ISO IEC 27005:2008 Information technology -- Security techniques -- Information security risk management

    BSI
    PDF
    BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 Information technology. Security techniques. Code of practice for information security management

    BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 Information technology. Security techniques. Code of practice for information security management

    BSI, 2007
    PDF
    BS ISO/IEC 27035:2011 Information technology. Security techniques. Information security incident management

    BS ISO/IEC 27035:2011 Information technology. Security techniques. Information security incident management

    BSi, 2011
    PDF
    Energy Security in Asia (Routledge Security in Asia Pacific Series)

    Energy Security in Asia (Routledge Security in Asia Pacific Series)

    Michael Wesley, 2007
    PDF
    Information Assurance: Managing Organizational IT Security Risks

    Information Assurance: Managing Organizational IT Security Risks

    Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security ManagerEuropean Command (EUCOM), 2002
    PDF
    Enterprise Security for the Executive: Setting the Tone from the Top (PSI Business Security)

    Enterprise Security for the Executive: Setting the Tone from the Top (PSI Business Security)

    Jennifer Bayuk, 2009
    PDF
    Enterprise Information Security: Information Security For Non-technical Decision Makers

    Enterprise Information Security: Information Security For Non-technical Decision Makers

    Peter Gregory, 2003
    CHM
    Enterprise Security Architecture Using IBM Tivoli Security Solutions

    Enterprise Security Architecture Using IBM Tivoli Security Solutions

    IBM Redbooks, 2004
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram, John Viega, 2009
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram, John Viega, 2009
    PDF
    European Union Security Dynamics: In The New National Interest (New Security Challenges Series)

    European Union Security Dynamics: In The New National Interest (New Security Challenges Series)

    Janne Haaland Matlary, 2009
    PDF
    Software security : building security in

    Software security : building security in

    Gary McGraw, 2006
    CHM
    Software Security: Building Security In

    Software Security: Building Security In

    Gary McGraw, 2006
    PDF
    Software Security: Building Security In

    Software Security: Building Security In

    Gary McGraw, 2006
    PDF
    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
    PDF
    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
    PDF
    Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

    Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

    Josh Shaul, Aaron Ingram, 2007
    PDF
    Western Balkans Security Observer Vol 5 No. 18 - Ten Years of Security Sector Reform in Serbia

    Western Balkans Security Observer Vol 5 No. 18 - Ten Years of Security Sector Reform in Serbia

    Marko Zilovic, Miroslav Hadzic, Sonja Stojanovic, Filip Ejdus (eds.), 2010
    PDF
    Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

    Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

    Klaus-Peter Fischer-Hellmann (auth.), Rainer Bischoff (eds.), 2012
    PDF
    Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop

    Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop

    Joint Committees on the Future of the Nuclear Security Environment in 2015, Russian Academy of Sciences, National Research Council, 2009
    PDF
    Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

    Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

    Gilbert N Sorebo; Michael C Echols, 2011
    PDF
    Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

    Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

    Catherine Paquet, 2009
    |< ۳۰ ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.