ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۳۶ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Android Security Internals: An In-Depth Guide to Android’s Security Architecture

    Android Security Internals: An In-Depth Guide to Android’s Security Architecture

    Nikolay Elenkov, 2014
    EPUB
    Mastering Python for networking and security : leverage Python scripts and libraries to overcome networking and security issues

    Mastering Python for networking and security : leverage Python scripts and libraries to overcome networking and security issues

    Manuel Ortega, José, 2018
    PDF
    Solving the Security Awareness Puzzle: A Practical Guide to Shaping Your Organization’s Security Behavior, Attitudes, and Culture

    Solving the Security Awareness Puzzle: A Practical Guide to Shaping Your Organization’s Security Behavior, Attitudes, and Culture

    Perry Carpenter, 2019
    EPUB
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram; John Viega, 2009
    PDF
    Android Security Internals: An In-Depth Guide to Android’s Security Architecture

    Android Security Internals: An In-Depth Guide to Android’s Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy

    Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy

    Doyle, J., 2011
    PDF
    Nmap: Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Nmap: Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Paulino Calderon, 2017
    PDF
    Deviant Security - The Technical Computer Security Practices of Cyber Criminals

    Deviant Security - The Technical Computer Security Practices of Cyber Criminals

    Eric Van De Sandt, 2019
    EPUB
    Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

    Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

    Tony Hsu, 2018
    PDF
    Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel

    Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel

    Peter De Tender, David Rendon, Samuel Erskine, 2019
    PDF
    On Watch : Profiles from the National Security Agency's Past 40 Years

    On Watch : Profiles from the National Security Agency's Past 40 Years

    National Security Agency, 2016
    PDF
    Computer Security Divsion Annual Report 2015

    Computer Security Divsion Annual Report 2015

    Computer Security Divsion NIST, 2016
    EPUB
    Solving the Security Awareness Puzzle: A Practical Guide to Shaping Your Organization’s Security Behavior, Attitudes, and Culture

    Solving the Security Awareness Puzzle: A Practical Guide to Shaping Your Organization’s Security Behavior, Attitudes, and Culture

    Perry Carpenter, 2019
    PDF
    Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines

    Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines

    Abhishek Chopra, Mukund Chaudhary, 2020
    PDF
    Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security

    Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security

    Erickson Karnel, 2019
    PDF
    Information Technology - Security Techniques - Code of Practice for Information Security

    Information Technology - Security Techniques - Code of Practice for Information Security

    BSI, 2013
    PDF
    Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment

    Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment

    Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler, 2020
    PDF
    Offensive Security OSCP

    Offensive Security OSCP

    Offensive Security, 2020
    EPUB
    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Qing Li; Gregory Clark, 2015
    PDF
    Security from Zero: Practical Security for Busy People

    Security from Zero: Practical Security for Busy People

    Eric Higgins, 2020
    PDF
    ISO/IEC 27004:2016, Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

    ISO/IEC 27004:2016, Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

    ISO/IEC JTC 1/SC 27, 2016
    PDF
    Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)

    Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)

    Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor), 2020
    PDF
    Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework

    Information Security Handbook: Develop a threat model and incident response strategy to build a strong information security framework

    Darren Death, 2017
    EPUB
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    |< ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.