ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۳۹ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    EPUB
    The Changing Dimensions of Security: India's Security Policy Options

    The Changing Dimensions of Security: India's Security Policy Options

    Suresh R., 2015
    EPUB
    International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation, 2017
    EPUB
    The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

    The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More

    Arjan Tijms, Teo Bais, Werner Keil, 2022
    EPUB
    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mark Dunkerley, Matt Tumbarello, 2022
    PDF
    ISO/IEC 27002 (2022): Information security, cybersecurity and privacy protection — Information security controls

    ISO/IEC 27002 (2022): Information security, cybersecurity and privacy protection — Information security controls

    ISO Committee, 2022
    PDF
    Advances in Information and Computer Security: 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings (Lecture Notes in Computer Science, 13504)

    Advances in Information and Computer Security: 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 – September 2, 2022, Proceedings (Lecture Notes in Computer Science, 13504)

    Chen-Mou Cheng (editor), Mitsuaki Akiyama (editor), 2022
    PDF
    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition

    Mark Dunkerley, Matt Tumbarello, 2022
    PDF
    Rethinking Energy Security in Asia: A Non-Traditional View of Human Security

    Rethinking Energy Security in Asia: A Non-Traditional View of Human Security

    Mely Caballero-Anthony, Swee Lean Collin Koh (auth.), Mely Caballero-Anthony, Youngho Chang, Nur Azha Putra (eds.), 2012
    EPUB
    It Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing It Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide - Second Edition

    It Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing It Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide - Second Edition

    Lance Batten, 2012
    EPUB
    Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform

    Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform

    Ursula C. Schroeder, Fairlie Chappuis, 2015
    PDF
    Essential Computer Security. Everyone's Guide to E-mail, Internet, and Wireless Security

    Essential Computer Security. Everyone's Guide to E-mail, Internet, and Wireless Security

    Tony Bradley, CISSP-ISSAP (Eds.)
    PDF
    Security Analytics: A Data Centric Approach to Information Security

    Security Analytics: A Data Centric Approach to Information Security

    Mehak Khurana, Shilpa Mahajan, 2022
    EPUB
    Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

    Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

    Trevor Stuart; Joe Anich, 2022
    PDF
    Critical Security Studies in the Digital Age: Social Media and Security

    Critical Security Studies in the Digital Age: Social Media and Security

    Joseph Downing, 2023
    PDF
    Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900: Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

    Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900: Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

    Dwayne Natwick, 2022
    PDF
    Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance)

    Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance)

    J. Stewart, 2010
    PDF
    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1

    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1

    Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, 2023
    PDF
    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2

    Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2

    Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, 2023
    PDF
    Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States

    Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States

    Judith Nora Hardt, Cameron Harrington, Franziskus von Lucke, Adrien Estève, Nick P. Simpson, 2023
    EPUB
    Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security

    Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security

    Redouane MEDDANE, 2022
    PDF
    ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection — Guidance on managing information security risks

    ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection — Guidance on managing information security risks

    ISO, 2022
    EPUB
    Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

    Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments

    Luigi Aversa, 2023
    EPUB
    Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    Aligning the Governance Structure of the NNSA Laboratories to Meet 21st Century National Security Challenges

    National Research Council; Division on Engineering and Physical Sciences; Laboratory Assessments Board; Committee on Assessment of the Governance Structure of the NNSA National Security Laboratories, 2015
    PDF
    The NICE Cyber Security Framework. Cyber Security Intelligence and Analytics

    The NICE Cyber Security Framework. Cyber Security Intelligence and Analytics

    Izzat Alsmadi, 2023
    PDF
    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Balancing the National Interest: U. S. National Security Export Controls and Global Economic Competition

    Institute of Medicine National Academy of Engineering National Academy of Sciences; and Public Policy Engineering Committee on Science; Panel on the Impact of National Security Controls on International Technology Transfer, 1987
    |< ۳۴ ۳۵ ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ ۴۲ ۴۳ ۴۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.