ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۳۶ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Critical Infrastructure: Homeland Security and Emergency Preparedness, Second Edition

    Critical Infrastructure: Homeland Security and Emergency Preparedness, Second Edition

    Robert Radvanovsky, Allan McDougall, 2009
    PDF
    Mobile and Wireless Network Security and Privacy

    Mobile and Wireless Network Security and Privacy

    S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki, 2007
    PDF
    Mobile and Wireless Network Security and Privacy

    Mobile and Wireless Network Security and Privacy

    S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki, 2007
    PDF
    Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings

    Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings

    Benjamin Johnson, Pascal Schöttle, Rainer Böhme (auth.), Jens Grossklags, Jean Walrand (eds.), 2012
    PDF
    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Yuanmi Chen, Phong Q. Nguyen (auth.), Dong Hoon Lee, Xiaoyun Wang (eds.), 2011
    PDF
    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Yuanmi Chen, Phong Q. Nguyen (auth.), Dong Hoon Lee, Xiaoyun Wang (eds.), 2011
    PDF
    Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

    Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

    Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park (auth.), Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo (eds.), 2009
    PDF
    Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

    Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

    Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park (auth.), Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo (eds.), 2009
    PDF
    Soils and Food Security

    Soils and Food Security

    R E Hester, R M Harrison, Luca Montanarella, Peter Gregory, Wendy Peterman, Ingrid Iborn, Fredrick O Ayuke, Paul Hallett, David Robinson, Bernard Vanlauwe, David Manning, 2012
    PDF
    Hunger Efforts and Food Security

    Hunger Efforts and Food Security

    James C. Tobin, 2008
    PDF
    Civilizing Security

    Civilizing Security

    Ian Loader, Neil Walker, 2007
    PDF
    Deviance in International Relations: ‘Rogue States’ and International Security

    Deviance in International Relations: ‘Rogue States’ and International Security

    Wolfgang Wagner, Wouter Werner, Michal Onderco (eds.), 2014
    PDF
    Contending with Terrorism: Roots, Strategies, and Responses (International Security Readers)

    Contending with Terrorism: Roots, Strategies, and Responses (International Security Readers)

    Michael E. Brown, Owen R. Cote Jr., Sean M. Lynn-Jones, Steven E. Miller, 2010
    PDF
    A Practical Guide to Security Assessments

    A Practical Guide to Security Assessments

    Sudhanshu Kairab, 2005
    PDF
    Aviation Security Management

    Aviation Security Management

    2008
    PDF
    Asia’s New Institutional Architecture: Evolving Structures for Managing Trade, Financial, and Security Relations

    Asia’s New Institutional Architecture: Evolving Structures for Managing Trade, Financial, and Security Relations

    Vinod K. Aggarwal, Min Gyo Koo (auth.), Professor Vinod K. Aggarwal, Professor Min Gyo Koo (eds.), 2008
    PDF
    Assessing and Managing Security Risk in IT Systems: A Structured Methodology

    Assessing and Managing Security Risk in IT Systems: A Structured Methodology

    John McCumber, 2004
    PDF
    Assessing and Managing Security Risk in IT Systems: A Structured Methodology

    Assessing and Managing Security Risk in IT Systems: A Structured Methodology

    John McCumber, 2004
    PDF
    Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives

    Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives

    W. Barry Nixon, Kim Kerr, 2008
    PDF
    E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication

    E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication

    Nancy Flynn Randolph Kahn, 2003
    PDF
    How to Cheat at Managing Information Security

    How to Cheat at Managing Information Security

    Osborne M., Summitt P., 2006
    PDF
    Information Assurance: Managing Organizational IT Security Risks

    Information Assurance: Managing Organizational IT Security Risks

    Joseph Boyce, Daniel Jennings, 2002
    PDF
    Information Assurance: Managing Organizational IT Security Risks

    Information Assurance: Managing Organizational IT Security Risks

    Joseph Boyce, Daniel Jennings, 2002
    PDF
    Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

    Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

    Fei Hu, 2016
    PDF
    Electronic Properties of Inorganic and Organic Semiconductors and Their Application to National Security Needs

    Electronic Properties of Inorganic and Organic Semiconductors and Their Application to National Security Needs

    Smith D.L., 2004
    |< ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.