ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۳۶ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Insuring Security: Biopolitics, Security And Risk

    Insuring Security: Biopolitics, Security And Risk

    Luis Lobo-Guerrero, 2011
    EPUB
    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Resource, Cyber Security, 2021
    PDF
    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Henry Dalziel, Ajin Abraham, 2015
    PDF
    Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

    Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

    Carolyn Mae Kim; Robert H Deatherage Jr, 2021
    PDF
    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Germany, Poland and the Common Security and Defence Policy: Converging Security and Defence Perspectives in an Enlarged EU

    Laura Chappell, 2012
    PDF
    Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

    Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

    Mark Talabis, Robert McPherson, Inez Miyamoto, Jason Martin, 2014
    PDF
    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

    Henry Dalziel, Ajin Abraham, 2015
    PDF
    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Iwan Hoogendoorn, 2021
    PDF
    Comptia Security+ Guide to Network Security Fundamentals

    Comptia Security+ Guide to Network Security Fundamentals

    Mark Ciampa, 2021
    PDF
    Practical Security Automation and Testing: Tools and techniques for automated security scanning and testing in DevSecOps

    Practical Security Automation and Testing: Tools and techniques for automated security scanning and testing in DevSecOps

    Tony Hsiang-Chih Hsu, 2019
    PDF
    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

    Douglas Landoll, 2021
    PDF
    Women, Peace, and Security: Feminist Perspectives on International Security

    Women, Peace, and Security: Feminist Perspectives on International Security

    Caroline Leprince, Cassandra Steer, Stéfanie von Hlatky, 2021
    PDF
    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)

    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)

    Jonathan Weissman, 2021
    PDF
    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)

    Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)

    Jonathan S. Weissman, 2021
    PDF
    Intelligent and Connected Vehicle Security (River Publishers Series in Security and Digital Forensics)

    Intelligent and Connected Vehicle Security (River Publishers Series in Security and Digital Forensics)

    Jiajia Liu (editor), Abderrahim Benslimane (editor), 2021
    PDF
    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition

    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, 3rd Edition

    Paulino Calderon, 2021
    PDF
    Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)

    Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications)

    Arun Kumar Singh (editor), Balwinder Raj (editor), 2021
    PDF
    Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings (Lecture Notes in Computer Science, 12835)

    Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings (Lecture Notes in Computer Science, 12835)

    Toru Nakanishi (editor), Ryo Nojima (editor), 2021
    EPUB
    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips

    Paulino Calderon, 2021
    PDF
    Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II

    Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II

    Elisa Bertino, Haya Shulman, Michael Waidner, 2021
    PDF
    Blockchain for International Security: The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls (Advanced Sciences and Technologies for Security Applications)

    Blockchain for International Security: The Potential of Distributed Ledger Technology for Nonproliferation and Export Controls (Advanced Sciences and Technologies for Security Applications)

    Cindy Vestergaard (editor), 2021
    EPUB
    Core Software Security: Security at the Source

    Core Software Security: Security at the Source

    James Ransome, Anmol Misra, 2013
    PDF
    Rights As Security: The Theoretical Basis Of Security Of Person

    Rights As Security: The Theoretical Basis Of Security Of Person

    Rhonda Powell, 2019
    PDF
    Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)

    Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)

    Reza Montasari (editor), Hamid Jahankhani (editor), Haider Al-Khateeb (editor), 2021
    EPUB
    Internet of Things Security: Architectures and Security Measures

    Internet of Things Security: Architectures and Security Measures

    Chuan-Kun Wu, 2021
    |< ۳۱ ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.