ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۳۸ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Assessment of technologies deployed to improve aviation security.

    Assessment of technologies deployed to improve aviation security.

    Panel on Assessment of Technologies Deployed to Improve Aviation Security, National Materials Advisory Board, Commission on Engineering
    PDF
    Assessment of the Bureau of Reclamation's Security Program

    Assessment of the Bureau of Reclamation's Security Program

    Committee to Assess the Bureau of Reclamation"s Security Program, 2008
    PDF
    International Security vol.2: The Transition to the Post-Cold War Security Agenda

    International Security vol.2: The Transition to the Post-Cold War Security Agenda

    Professor Barry Buzan, 2007
    PDF
    International Security vol.3:Widening Security

    International Security vol.3:Widening Security

    Professor Barry Buzan, 2007
    PDF
    Social Security Administration Electronic Service Provision: A Strategic Assessment

    Social Security Administration Electronic Service Provision: A Strategic Assessment

    Committee on the Social Security Administration"s E-Government Strategy, 2007
    PDF
    Pro PHP security : from application security principles to the implementation of XSS defenses

    Pro PHP security : from application security principles to the implementation of XSS defenses

    Chris Snyder
    PDF
    Pro PHP Security, 2nd Edition: From Application Security Principles to the Implementation of XSS Defenses

    Pro PHP Security, 2nd Edition: From Application Security Principles to the Implementation of XSS Defenses

    Chris Snyder, 2010
    PDF
    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

    Chris Snyder, 2010
    PDF
    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition

    Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition

    Chris Snyder, 2010
    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-2

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-2

    PDF
    Information technology - Security techniques - Evaluation criteria for IT security iso15408-3

    Information technology - Security techniques - Evaluation criteria for IT security iso15408-3

    PDF
    Security+ Guide to Network Security Fundamentals, 4th ed.

    Security+ Guide to Network Security Fundamentals, 4th ed.

    Mark Ciampa, 2012
    PDF
    Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

    Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

    Saif ur Rehman, 2010
    EPUB
    The Art of Software Security Testing: Identifying Software Security Flaws

    The Art of Software Security Testing: Identifying Software Security Flaws

    Chris Wysopal, 2006
    PDF
    ISO/IEC 27004:2009, Information technology - Security techniques - Information security management - Measurement

    ISO/IEC 27004:2009, Information technology - Security techniques - Information security management - Measurement

    ISO/IEC/JTC 1/SC 27, 2009
    PDF
    Security for Wireless Sensor Networks (Advances in Information Security)

    Security for Wireless Sensor Networks (Advances in Information Security)

    Donggang Liu, 2006
    PDF
    Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)

    Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)

    Wenke Lee, 2010
    PDF
    Building a Home Security System with Raspberry Pi: Build your own sophisticated modular home security system using the popular Raspberry Pi board

    Building a Home Security System with Raspberry Pi: Build your own sophisticated modular home security system using the popular Raspberry Pi board

    Matthew Poole, 2015
    PDF
    English-Chinese, Chinese-English Nuclear Security Glossary

    English-Chinese, Chinese-English Nuclear Security Glossary

    Committee on the U.S.-Chinese Glossary of Nuclear Security Terms, 2008
    PDF
    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Elisa Bertino, 2003
    PDF
    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

    Elisa Bertino, 2003
    PDF
    ISO/IEC 27003:2010, Information technology - Security techniques - Information security management system implementation guidance

    ISO/IEC 27003:2010, Information technology - Security techniques - Information security management system implementation guidance

    ISO/IEC/JTC 1/SC 27, 2010
    PDF
    Becoming a global chief security executive officer : a how to guide for next generation security leaders

    Becoming a global chief security executive officer : a how to guide for next generation security leaders

    Cloutier, 2015
    PDF
    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

    Qing Li, 2015
    |< ۳۳ ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ ۴۲ ۴۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.