ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Organization And Data Processing، صفحه ۳۹۸ از ۱۸,۶۷۳ در بین ۴۶۶,۸۲۲ کتاب.
    PDF
    Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    Jonathan Zdziarski, 2012
    EPUB
    Unsupervised Machine Learning in Python: Master Data Science and Machine Learning with Cluster Analysis, Gaussian Mixture Models, and Principal Components Analysis

    Unsupervised Machine Learning in Python: Master Data Science and Machine Learning with Cluster Analysis, Gaussian Mixture Models, and Principal Components Analysis

    Unknown, 2016
    PDF
    Exercise Physiology: Kinanthropometry and Exercise Physiology Laboratory Manual 2nd Edition: Volume 2 Tests, Procedures and Data

    Exercise Physiology: Kinanthropometry and Exercise Physiology Laboratory Manual 2nd Edition: Volume 2 Tests, Procedures and Data

    R.G. Eston, Thomas Reilly, 2001
    PDF
    Kinanthropometry and Exercise Physiology Laboratory Manual, 2 : Physiology - Tests, Procedures and Data

    Kinanthropometry and Exercise Physiology Laboratory Manual, 2 : Physiology - Tests, Procedures and Data

    Thomas Reilly; Roger Eston, 2008
    PDF
    Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Anthropometry

    Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Anthropometry

    Thomas Reilly, Roger Eston, Roger Eston, Tom Reilly, 2008
    MOBI
    Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Volume One: Anthropometry

    Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Volume One: Anthropometry

    Thomas Reilly, Roger Eston, 2008
    MOBI
    Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Volume Two: Physiology

    Kinanthropometry and Exercise Physiology Laboratory Manual: Tests, Procedures and Data: Volume Two: Physiology

    Thomas Reilly, Roger Eston, 2008
    PDF
    Algorithms and Data Structures for External Memory (Foundations and Trends(R) in Theoretical Computer Science)

    Algorithms and Data Structures for External Memory (Foundations and Trends(R) in Theoretical Computer Science)

    Jeffrey Scott Vitter, 2008
    PDF
    Exploration and Analysis of DNA Microarray and Protein Array Data

    Exploration and Analysis of DNA Microarray and Protein Array Data

    Dhammika Amaratunga, Javier Cabrera, 2004
    PDF
    UNIX and Perl to the Rescue! : A Field Guide for the Life Sciences (and Other Data-rich Pursuits)

    UNIX and Perl to the Rescue! : A Field Guide for the Life Sciences (and Other Data-rich Pursuits)

    Keith Bradnam; Ian Korf, 2012
    PDF
    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
    PDF
    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
    PDF
    Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

    Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

    R. Sekar (auth.), Yingjiu Li (eds.), 2011
    PDF
    Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

    Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

    Leendert van der Torre (auth.), Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.), 2012
    PDF
    Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings

    Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings

    Vijay Atluri, Günther Pernul (eds.), 2014
    PDF
    Binary systems. Part 2: Elements and Binary Systems from B – C to Cr – Zr: Phase Diagrams, Phase Transition Data, Integral and Partial Quantities of Alloys

    Binary systems. Part 2: Elements and Binary Systems from B – C to Cr – Zr: Phase Diagrams, Phase Transition Data, Integral and Partial Quantities of Alloys

    P. Franke, D. Neuschütz (auth.), P. Franke, D. Neuschütz (eds.), 2004
    PDF
    Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012

    Information Technology Convergence, Secure and Trust Computing, and Data Management: ITCS 2012 & STA 2012

    Carlos Juiz, Mercedes Gómez (auth.), Jong Hyuk (James) Park, Jongsung Kim, Deqing Zou, Yang Sun Lee (eds.), 2012
    PDF
    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
    PDF
    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
    PDF
    Data communications networking devices : operation, utilization and LAN and WAN Internet

    Data communications networking devices : operation, utilization and LAN and WAN Internet

    Gilbert Held, 1998
    PDF
    Data Communications Networking Devices: Operation, Utilization and LAN and WAN Internetworking

    Data Communications Networking Devices: Operation, Utilization and LAN and WAN Internetworking

    Gilbert Held, 1998
    PDF
    Data Communications Networking Devices: Operation, Utilization and LAN and WAN Internetworking, Fourth Edition

    Data Communications Networking Devices: Operation, Utilization and LAN and WAN Internetworking, Fourth Edition

    Gilbert Held(auth.), 1998
    DJVU
    Algorithms and data structures in F and Fortran

    Algorithms and data structures in F and Fortran

    Robin A. Vowels, 1999
    PDF
    Data mining and medical knowledge management: cases and applications

    Data mining and medical knowledge management: cases and applications

    Petr Berka, Jan Rauch, Djamel Abdelkader Zighed, Petr Berka, Jan Rauch, Djamel Abdelkader Zighed, 2009
    PDF
    Manual on Presentation of Data and Control Chart Analysis, 7th Edition

    Manual on Presentation of Data and Control Chart Analysis, 7th Edition

    ASTM Committee E-11 on Quality and Statistics, 2002
    |< ۳۹۳ ۳۹۴ ۳۹۵ ۳۹۶ ۳۹۷ ۳۹۸ ۳۹۹ ۴۰۰ ۴۰۱ ۴۰۲ ۴۰۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.