ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۳۷ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Internet of Things Security: Architectures and Security Measures

    Internet of Things Security: Architectures and Security Measures

    Chuan-Kun Wu, 2021
    EPUB
    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Iwan Hoogendoorn, 2021
    EPUB
    Governing Security After War: The Politics of Institutional Change in the Security Sector

    Governing Security After War: The Politics of Institutional Change in the Security Sector

    Louis-Alexandre Berg, 2022
    PDF
    PRAGMATIC Security Metrics: Applying Metametrics to Information Security

    PRAGMATIC Security Metrics: Applying Metametrics to Information Security

    W. Krag Brotby, Gary Hinson, 2013
    PDF
    Offensive Security - BackTrack to the Max Cracking the Perimeter V

    Offensive Security - BackTrack to the Max Cracking the Perimeter V

    Offensive Security, 2008
    PDF
    Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-601)

    Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-601)

    Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger Davis, Dwayne Williams, 2021
    PDF
    Principles of Computer Security: CompTIA Security+ and Beyond - Lab Manual - (Exam SY0-601)

    Principles of Computer Security: CompTIA Security+ and Beyond - Lab Manual - (Exam SY0-601)

    Jonathan Weissman, 2021
    EPUB
    CIS Critical Security Controls

    CIS Critical Security Controls

    Center for Internet Security, 2021
    PDF
    Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy

    Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy

    Douglas C. Lovelace Jr. (editor), 2018
    PDF
    Definitive Guide to Security in Jakarta EE - Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

    Definitive Guide to Security in Jakarta EE - Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

    Arjan Tijms, Teo Bais, Werner Keil, 2022
    PDF
    Connected Places: cyber security principles.

    Connected Places: cyber security principles.

    National Cyber Security Centre
    EPUB
    Water Security in India: Water Policy and Human Security in the Indian Region

    Water Security in India: Water Policy and Human Security in the Indian Region

    Vandana Asthana; A. C. Shukla, 2014
    EPUB
    Security and Stability in the New Space Age: The Orbital Security Dilemma

    Security and Stability in the New Space Age: The Orbital Security Dilemma

    Brad Townsend, 2020
    EPUB
    Victims as Security Threats: Refugee Impact on Host State Security in Africa

    Victims as Security Threats: Refugee Impact on Host State Security in Africa

    Edward Mogire, 2016
    EPUB
    Russia's Policy Challenges: Security, Stability and Development: Security, Stability and Development

    Russia's Policy Challenges: Security, Stability and Development: Security, Stability and Development

    Stephen K. Wegren, 2016
    EPUB
    United States - Africa Security Relations: Terrorism, Regional Security and National Interests

    United States - Africa Security Relations: Terrorism, Regional Security and National Interests

    Kelechi A. Kalu; George Klay Kieh Jr., 2013
    EPUB
    The Changing Dimensions of Security: India's Security Policy Options

    The Changing Dimensions of Security: India's Security Policy Options

    Suresh R., 2015
    EPUB
    The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

    The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

    Arjan Tijms, Teo Bais, Werner Keil, 2022
    EPUB
    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mark Dunkerley, Matt Tumbarello, 2022
    PDF
    ISO/IEC 27002 (2022): Information security, cybersecurity and privacy protection — Information security controls

    ISO/IEC 27002 (2022): Information security, cybersecurity and privacy protection — Information security controls

    ISO Committee, 2022
    PDF
    Advances in Information and Computer Security: 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings (Lecture Notes in Computer Science, 13504)

    Advances in Information and Computer Security: 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings (Lecture Notes in Computer Science, 13504)

    Chen-Mou Cheng (editor), Mitsuaki Akiyama (editor), 2022
    PDF
    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mark Dunkerley, Matt Tumbarello, 2022
    PDF
    Rethinking Energy Security in Asia: A Non-Traditional View of Human Security

    Rethinking Energy Security in Asia: A Non-Traditional View of Human Security

    Mely Caballero-Anthony, Swee Lean Collin Koh (auth.), Mely Caballero-Anthony, Youngho Chang, Nur Azha Putra (eds.), 2012
    EPUB
    It Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing It Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide - Second Edition

    It Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing It Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide - Second Edition

    Lance Batten, 2012
    EPUB
    Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform

    Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform

    Ursula C. Schroeder, Fairlie Chappuis, 2015
    |< ۳۲ ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ ۴۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.