ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Center Technology Information، صفحه ۳۷۶ از ۸۷۵ در بین ۲۱,۸۷۵ کتاب.
    PDF
    String Processing and Information Retrieval: 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings

    String Processing and Information Retrieval: 14th International Symposium, SPIRE 2007 Santiago, Chile, October 29-31, 2007 Proceedings

    Mohamed Abouelhoda (auth.), 2007
    PDF
    The Politics of Information: Problems of Policy in Modern Media

    The Politics of Information: Problems of Policy in Modern Media

    Anthony Smith (auth.), 1978
    DJVU
    Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers

    Error Control, Cryptology, and Speech Compression: Workshop on Information Protection Moscow, Russia, December 6–9, 1993 Selected Papers

    V. A. Artamonov, 1994
    PDF
    Shamans, Software and Spleens : Law and the Construction of the Information Society

    Shamans, Software and Spleens : Law and the Construction of the Information Society

    James Boyle, 1997
    PDF
    Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

    Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

    Xavier Boyen (auth.), 2008
    PDF
    Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

    Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

    Xavier Boyen (auth.), 2008
    PDF
    How to Find Business Information: A Guide for Business People, Investors, and Researchers

    How to Find Business Information: A Guide for Business People, Investors, and Researchers

    Lucy Heckman, 2011
    PDF
    Game Theory: Stochastics, Information, Strategies and Cooperation

    Game Theory: Stochastics, Information, Strategies and Cooperation

    Joachim Rosenmüller (auth.), 2000
    PDF
    Privacy, Property and Personality: Civil Law Perspectives on Commercial Appropriation (Cambridge Intellectual Property and Information Law)

    Privacy, Property and Personality: Civil Law Perspectives on Commercial Appropriation (Cambridge Intellectual Property and Information Law)

    Huw Beverley-Smith, 2006
    PDF
    The Value of a Good Idea : Developing and Protecting Intellectual Property in an Information Age

    The Value of a Good Idea : Developing and Protecting Intellectual Property in an Information Age

    The Silver Lake Editors, 2002
    EPUB
    Education: a guide to reference and information sources

    Education: a guide to reference and information sources

    Nancy P. O"Brien, 2000
    DJVU
    Research and Development in Information Retrieval: Proceedings, Berlin, May 18–20, 1982

    Research and Development in Information Retrieval: Proceedings, Berlin, May 18–20, 1982

    Norbert Henrichs (auth.), 1983
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Biology, Digital Information, and Computing

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Biology, Digital Information, and Computing

    Professor Dr. Manfred R. Schroeder (auth.), 1984
    DJVU
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    DJVU
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 2006
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1986
    PDF
    L'individuation à la lumière des notions de forme et d'information

    L'individuation à la lumière des notions de forme et d'information

    Gilbert Simondon, 2005
    PDF
    Information Computing and Applications: Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings

    Information Computing and Applications: Third International Conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings

    Shan Jianfang, 2012
    PDF
    Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

    Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

    Feng Bao, 2016
    EPUB
    American Military History: A Guide to Reference and Information Sources

    American Military History: A Guide to Reference and Information Sources

    Daniel K. Blewett, 1995
    PDF
    New Photonics Technologies For The Information Age: The Dream Of Ubitquitous Services (Artech House Optoelectronics Library)

    New Photonics Technologies For The Information Age: The Dream Of Ubitquitous Services (Artech House Optoelectronics Library)

    Shoichi Sudo, 2004
    PDF
    Inhabited Information Spaces : Living with your Data (Computer Supported Cooperative Work)

    Inhabited Information Spaces : Living with your Data (Computer Supported Cooperative Work)

    David N. Snowdon, 2004
    |< ۳۷۱ ۳۷۲ ۳۷۳ ۳۷۴ ۳۷۵ ۳۷۶ ۳۷۷ ۳۷۸ ۳۷۹ ۳۸۰ ۳۸۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.