ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۳۶ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

    Andre Karamanian, Srinivas Tenneti, Francois Dessart, 2011
    PDF
    Security Monitoring with Cisco Security MARS

    Security Monitoring with Cisco Security MARS

    Gary Halleen, Greg Kellogg, 2007
    PDF
    IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions

    IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions

    André Loske (auth.), 2015
    PDF
    Global Food Security Governance: Civil society engagement in the reformed Committee on World Food Security

    Global Food Security Governance: Civil society engagement in the reformed Committee on World Food Security

    Jessica Duncan, 2015
    PDF
    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

    David R. Miller, Michael Gregg, 2007
    PDF
    Security administrator street smarts: a real world guide to CompTIA Security+ skills

    Security administrator street smarts: a real world guide to CompTIA Security+ skills

    David R. Miller, Michael Gregg, 2007
    EPUB
    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition

    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition

    David R. Miller, Michael Gregg, 2011
    PDF
    European Energy Security: Analysing the EU-Russia Energy Security Regime in Terms of Interdependence Theory

    European Energy Security: Analysing the EU-Russia Energy Security Regime in Terms of Interdependence Theory

    Dr. Nataliya Esakova (auth.), 2012
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram (ed.), John Viega (ed.), 2009
    PDF
    The myths of security: what the computer security industry doesn't want you to know

    The myths of security: what the computer security industry doesn't want you to know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

    John Viega, 2009
    PDF
    IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

    IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing

    Tobias Ackermann (auth.), 2013
    PDF
    Computer Security — ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings

    Computer Security — ESORICS 98: 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings

    Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi (auth.), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (eds.), 1998
    PDF
    Physical-layer security : from information theory to security engineering

    Physical-layer security : from information theory to security engineering

    Matthieu Bloch; Joao Barros, 2011
    PDF
    Physical-Layer Security: From Information Theory to Security Engineering

    Physical-Layer Security: From Information Theory to Security Engineering

    Matthieu Bloch, João Barros, 2011
    PDF
    Physical-Layer Security: From Information Theory to Security Engineering

    Physical-Layer Security: From Information Theory to Security Engineering

    Matthieu Bloch, João Barros, 2011
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2015
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Advances in Security Technology. Selected Papers of the Carnahan Conferences on Security Technology 1983–1985

    Advances in Security Technology. Selected Papers of the Carnahan Conferences on Security Technology 1983–1985

    Romine Deming (Eds.), 1987
    PDF
    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Robert H. Deng, 2010
    PDF
    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings

    Robert H. Deng, 2010
    PDF
    Advances in Information Security Management & Small Systems Security

    Advances in Information Security Management & Small Systems Security

    Les Labuschagne (auth.), 2001
    PDF
    China's Security Interests in the 21st Century (Routledgecurzon Security in Asia Series)

    China's Security Interests in the 21st Century (Routledgecurzon Security in Asia Series)

    Russell Ong, 2007
    |< ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.