ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Middle International، صفحه ۳۵۷ از ۱,۴۴۵ در بین ۳۶,۱۲۳ کتاب.
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings

    Sven Dietrich (eds.), 2014
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

    Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.), 2015
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

    Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez (eds.), 2016
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 ... Computer Science / Security and Cryptology)

    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 ... Computer Science / Security and Cryptology)

    Bernhard Hämmerli, Robin Sommer, 2007
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings

    Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan (auth.), Bernhard M. Hämmerli, Robin Sommer (eds.), 2007
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Sandeep Bhatkar, R. Sekar (auth.), Diego Zamboni (eds.), 2008
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

    Sandeep Bhatkar, R. Sekar (auth.), Diego Zamboni (eds.), 2008
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

    Youngsang Shin, Steven Myers, Minaxi Gupta (auth.), Ulrich Flegel, Danilo Bruschi (eds.), 2009
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

    Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

    Youngsang Shin, Steven Myers, Minaxi Gupta (auth.), Ulrich Flegel, Danilo Bruschi (eds.), 2009
    PDF
    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
    PDF
    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
    PDF
    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Taizo Shirai, Bart Preneel (auth.), Pil Joong Lee (eds.), 2004
    PDF
    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Pascal Paillier, Damien Vergnaud (auth.), Bimal Roy (eds.), 2005
    PDF
    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
    PDF
    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
    PDF
    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
    PDF
    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
    PDF
    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

    Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.), 2013
    PDF
    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

    Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.), 2013
    PDF
    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
    PDF
    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
    PDF
    Advances in Cryptology — CRYPTO’ 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings

    Advances in Cryptology — CRYPTO’ 99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings

    Jean-Sébastien Coron, David Naccache, Julien P. Stern (auth.), Michael Wiener (eds.), 1999
    PDF
    Advances in Electronic Circuit Packaging: Volume 5 Proceedings of the Fifth International Electronic Circuit Packaging Symposium sponsored by the University of Colorado, EDN (Electrical Design News), and Design News, held at Boulder, Colorado, August 19–21, 1964

    Advances in Electronic Circuit Packaging: Volume 5 Proceedings of the Fifth International Electronic Circuit Packaging Symposium sponsored by the University of Colorado, EDN (Electrical Design News), and Design News, held at Boulder, Colorado, August 19–21, 1964

    George R. Dallimore (auth.), Lawrence L. Rosine (eds.), 1965
    PDF
    Advances in Data Science and Classification: Proceedings of the 6th Conference of the International Federation of Classification Societies (IFCS-98) Università “La Sapienza”, Rome, 21–24 July, 1998

    Advances in Data Science and Classification: Proceedings of the 6th Conference of the International Federation of Classification Societies (IFCS-98) Università “La Sapienza”, Rome, 21–24 July, 1998

    J. Douglas Carroll, Anil Chaturvedi (auth.), Professor Alfredo Rizzi, Professor Maurizio Vichi, Professor Dr. Hans-Hermann Bock (eds.), 1998
    PDF
    Agriculture and International Relations: Analysis and Policy : Essays in Memory of Theodor Heidhues

    Agriculture and International Relations: Analysis and Policy : Essays in Memory of Theodor Heidhues

    Hartwig de Haen, Glenn L. Johnson, Stefan Tangermann (eds.), 1985
    |< ۳۵۲ ۳۵۳ ۳۵۴ ۳۵۵ ۳۵۶ ۳۵۷ ۳۵۸ ۳۵۹ ۳۶۰ ۳۶۱ ۳۶۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.