ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۳۶۰ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Intelligence, Security and Policing Post-9/11: The UK’s Response to the ‘War on Terror’

    Intelligence, Security and Policing Post-9/11: The UK’s Response to the ‘War on Terror’

    Jon Moran, 2008
    PDF
    Intelligence, Security and Policy Post-9 11: The UK's Response to the War on Terror

    Intelligence, Security and Policy Post-9 11: The UK's Response to the War on Terror

    Jon Moran, 2008
    PDF
    Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

    Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

    Gregory Conti, 2008
    PDF
    Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

    Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

    Gregory Conti, 2008
    PDF
    Cognitive Communication and Cooperative HetNet Coexistence: Selected Advances on Spectrum Sensing, Learning, and Security Approaches

    Cognitive Communication and Cooperative HetNet Coexistence: Selected Advances on Spectrum Sensing, Learning, and Security Approaches

    Andrea Mariani, 2014
    PDF
    Enterprise security architecture : a business-driven approach

    Enterprise security architecture : a business-driven approach

    John Sherwood, 2005
    PDF
    The afterlife of property: domestic security and the Victorian novel

    The afterlife of property: domestic security and the Victorian novel

    Jeff Nunokawa, 1994
    PDF
    The Afterlife of Property: Domestic Security and the Victorian Novel

    The Afterlife of Property: Domestic Security and the Victorian Novel

    Jeff Nunokawa, 1994
    PDF
    Security as Practice: Discourse Analysis and the Bosnian War (The New International Relations)

    Security as Practice: Discourse Analysis and the Bosnian War (The New International Relations)

    Lene Hansen, 2006
    PDF
    Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

    Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

    Anthony Manley, 2009
    PDF
    Supply Chain Safety Management: Security and Robustness in Logistics

    Supply Chain Safety Management: Security and Robustness in Logistics

    Sandra Tandler, 2013
    PDF
    Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings

    Intelligence and Security Informatics: 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings

    Michael Chau, 2016
    PDF
    Crime and Security: Managing the Risk to Safe Shopping

    Crime and Security: Managing the Risk to Safe Shopping

    Adrian Beck, 2006
    PDF
    Building the architecture for sustainable space security: conference report 30-31 March 2006

    Building the architecture for sustainable space security: conference report 30-31 March 2006

    United Nations Institute for Disarmament Research, 2007
    PDF
    Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21–22, 2015, Proceedings

    Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21–22, 2015, Proceedings

    Sara Foresti (eds.), 2015
    PDF
    Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers

    Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers

    Jason Crampton, 2011
    PDF
    Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers

    Security and Trust Management: 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers

    Jason Crampton, 2011
    PDF
    Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers

    Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers

    Bjørnar Solhaug, 2012
    PDF
    Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    Peter Drábik, 2013
    PDF
    Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings

    Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings

    Costas Delakouridis, 2013
    PDF
    Seguridad industrial  Industrial Security (Spanish Edition)

    Seguridad industrial Industrial Security (Spanish Edition)

    Cesar Ramirez Cavassa, 2006
    PDF
    CompTIA Security+ All-in-One Exam Guide

    CompTIA Security+ All-in-One Exam Guide

    Gregory White, 2008
    PDF
    Human Comfort and Security of Information Systems: Advanced Interfaces for the Information Society

    Human Comfort and Security of Information Systems: Advanced Interfaces for the Information Society

    Greg Garrison (auth.), 1997
    EPUB
    New York Times v. United States. National Security and Censorship, Revised Edition

    New York Times v. United States. National Security and Censorship, Revised Edition

    D.J. Herda, 2011
    PDF
    CCSA NG: Check Point Certified Security Administrator Study Guide

    CCSA NG: Check Point Certified Security Administrator Study Guide

    Justin Menga, 2003
    |< ۳۵۵ ۳۵۶ ۳۵۷ ۳۵۸ ۳۵۹ ۳۶۰ ۳۶۱ ۳۶۲ ۳۶۳ ۳۶۴ ۳۶۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.