ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۴ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Activating Psychosocial Local Resources in Territories Affected by War and Terrorism:  Volume 57 NATO Science for Peace and Security Series - E: Human ... Security, E: Humans and Societal Dynamics)

    Activating Psychosocial Local Resources in Territories Affected by War and Terrorism: Volume 57 NATO Science for Peace and Security Series - E: Human ... Security, E: Humans and Societal Dynamics)

    E. Baloch-Kaloianov, A. Mikus-Kos, 2009
    PDF
    Building and Using Datasets on Armed Conflicts (Nato Science for Peace and Security) (Nato Science for Peace and Security)

    Building and Using Datasets on Armed Conflicts (Nato Science for Peace and Security) (Nato Science for Peace and Security)

    Mayeul Kauffmann
    PDF
    Air Pollution Modeling and its Application XIX (NATO Science for Peace and Security Series C: Environmental Security)

    Air Pollution Modeling and its Application XIX (NATO Science for Peace and Security Series C: Environmental Security)

    Carlos Borrego, Ana Isabel Miranda, 2008
    PDF
    Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security)

    Air Pollution Modeling and its Application XX (NATO Science for Peace and Security Series C: Environmental Security)

    Douw G. Steyn, S. T. Rao, 2010
    PDF
    Security and Liberty: Restriction by Stealth (Crime Prevention and Security Management)

    Security and Liberty: Restriction by Stealth (Crime Prevention and Security Management)

    Kate Moss-Brookes
    PDF
    Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings

    Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings

    Michael Roland, Josef Langer, Josef Scharinger (auth.), Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou (eds.), 2012
    PDF
    A Ready and Resilient Workforce for the Department of Homeland Security: Protecting America's Front Line

    A Ready and Resilient Workforce for the Department of Homeland Security: Protecting America's Front Line

    Committee on the Department of Homeland Security Workforce Resilience, Board on Health Sciences Policy, Institute of Medicine, 2013
    PDF
    Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers

    Quality, Reliability, Security and Robustness in Heterogeneous Networks: 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, DSRC 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers

    Ren Han, Xiaoxia Huang, Pan Li (auth.), Xi Zhang, Daji Qiao (eds.), 2012
    PDF
    Information Assurance: Managing Organizational IT Security Risks

    Information Assurance: Managing Organizational IT Security Risks

    Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security ManagerEuropean Command (EUCOM), 2002
    PDF
    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

    Bart Preneel (auth.), Tsuyoshi Takagi, Masahiro Mambo (eds.), 2009
    PDF
    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Advances in Information and Computer Security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings

    Jaideep Vaidya (auth.), Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.), 2010
    PDF
    Enterprise Security for the Executive: Setting the Tone from the Top (PSI Business Security)

    Enterprise Security for the Executive: Setting the Tone from the Top (PSI Business Security)

    Jennifer Bayuk, 2009
    PDF
    Enterprise Information Security: Information Security For Non-technical Decision Makers

    Enterprise Information Security: Information Security For Non-technical Decision Makers

    Peter Gregory, 2003
    CHM
    Enterprise Security Architecture Using IBM Tivoli Security Solutions

    Enterprise Security Architecture Using IBM Tivoli Security Solutions

    IBM Redbooks, 2004
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram, John Viega, 2009
    PDF
    Beautiful Security: Leading Security Experts Explain How They Think

    Beautiful Security: Leading Security Experts Explain How They Think

    Andy Oram, John Viega, 2009
    PDF
    European Union Security Dynamics: In The New National Interest (New Security Challenges Series)

    European Union Security Dynamics: In The New National Interest (New Security Challenges Series)

    Janne Haaland Matlary, 2009
    PDF
    Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop

    Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense, NATO Advanced Research Workshop

    Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko, 2005
    PDF
    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing)

    Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, ... Federation for Information Processing)

    S. H. (Basie) von Solms (auth.), Kai Rannenberg, Vijay Varadharajan, Christian Weber (eds.), 2006
    PDF
    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Security and Privacy – Silver Linings in the Cloud: 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Ian Piumarta, Alessandro Warth (auth.), Robert Hirschfeld, Kim Rose (eds.), 2010
    PDF
    Software security : building security in

    Software security : building security in

    Gary McGraw, 2006
    CHM
    Software Security: Building Security In

    Software Security: Building Security In

    Gary McGraw, 2006
    PDF
    Software Security: Building Security In

    Software Security: Building Security In

    Gary McGraw, 2006
    PDF
    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
    PDF
    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac, 2007
    |< ۱ ۲ ۳ ۴ ۵ ۶ ۷ ۸ ۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.