ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Information Resources Management، صفحه ۴۱ از ۱,۲۱۷ در بین ۳۰,۴۰۱ کتاب.
    PDF
    Information Literacy Landscapes. Information Literacy in Education, Workplace and Everyday Contexts

    Information Literacy Landscapes. Information Literacy in Education, Workplace and Everyday Contexts

    Annemaree Lloyd (Auth.), 2010
    PDF
    Information Extraction A Multidisciplinary Approach to an Emerging Information Technology: International Summer School, SCIE-97 Frascati, Italy, July 14–18, 1997

    Information Extraction A Multidisciplinary Approach to an Emerging Information Technology: International Summer School, SCIE-97 Frascati, Italy, July 14–18, 1997

    Yorick Wilks (auth.), 1997
    PDF
    Selected Topics in Information Theory: Lectures Held at the Department of Automation and Information September – October 1969

    Selected Topics in Information Theory: Lectures Held at the Department of Automation and Information September – October 1969

    Giuseppe Longo (auth.), 1973
    PDF
    The Architecture of Information: Architecture, Interaction Design and the Patterning of Digital Information

    The Architecture of Information: Architecture, Interaction Design and the Patterning of Digital Information

    Martyn Dade-Robertson, 2011
    PDF
    Supply Chain Coordination in Case of Asymmetric Information: Information Sharing and Contracting in a Just-in-Time environment.

    Supply Chain Coordination in Case of Asymmetric Information: Information Sharing and Contracting in a Just-in-Time environment.

    Guido Voigt (auth.), 2011
    PDF
    Information and the Internal Structure of the Universe: An Exploration into Information Physics

    Information and the Internal Structure of the Universe: An Exploration into Information Physics

    Professor Tom Stonier BA, 1990
    PDF
    Wireless Lan Medium Access Control and Physical Layer Specifications Information Technology: Telecommunications and Information Exchange Between Systems (Pt.11)

    Wireless Lan Medium Access Control and Physical Layer Specifications Information Technology: Telecommunications and Information Exchange Between Systems (Pt.11)

    1999
    PDF
    Education and the Knowledge Society: Information Technology Supporting Human Development (IFIP International Federation for Information Processing)

    Education and the Knowledge Society: Information Technology Supporting Human Development (IFIP International Federation for Information Processing)

    Tom J. van Weert (Editor), 2004
    PDF
    The European Information Society: Leading the Way with Geo-information

    The European Information Society: Leading the Way with Geo-information

    Jeffrey A. Bergamini, 2007
    PDF
    Handbook on Architectures of Information Systems (International Handbooks on Information Systems)

    Handbook on Architectures of Information Systems (International Handbooks on Information Systems)

    Peter Bernus, 2005
    PDF
    Wireless Sensor Network Security (Cryptology and Information Security) (Cryptology and Information Security)

    Wireless Sensor Network Security (Cryptology and Information Security) (Cryptology and Information Security)

    Javier Lopez
    PDF
    From Integrated Publication and Information Systems to Information and Knowledge Environments: Essays Dedicated to Erich J. Neuhold on the Occasion of His 65th Birthday

    From Integrated Publication and Information Systems to Information and Knowledge Environments: Essays Dedicated to Erich J. Neuhold on the Occasion of His 65th Birthday

    Thomas Risse (auth.), 2005
    PDF
    SAP BW Certification: A Business Information Warehouse Information Study Guide

    SAP BW Certification: A Business Information Warehouse Information Study Guide

    Catherine M. Roze, 2002
    PDF
    Computational Intelligence in Information Systems: Proceedings of the Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)

    Computational Intelligence in Information Systems: Proceedings of the Fourth INNS Symposia Series on Computational Intelligence in Information Systems (INNS-CIIS 2014)

    Somnuk Phon-Amnuaisuk, 2015
    PDF
    Information Extraction in the Web Era: Natural Language Communication for Knowledge Acquisition and Intelligent Information Agents

    Information Extraction in the Web Era: Natural Language Communication for Knowledge Acquisition and Intelligent Information Agents

    Roman Yangarber (auth.), 2003
    PDF
    Intelligent Information Technology: 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004. Proceedings

    Intelligent Information Technology: 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004. Proceedings

    K. Rajkumar, 2005
    PDF
    Information governance and security : protecting and managing your company's proprietary information

    Information governance and security : protecting and managing your company's proprietary information

    John Iannarelli, 2015
    PDF
    Strategies for Growth in SMEs: The Role of Information and Information Sytems

    Strategies for Growth in SMEs: The Role of Information and Information Sytems

    Margi Levy, 2004
    PDF
    Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

    Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

    Steven M. Furnell, 2008
    PDF
    Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

    Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

    Steven M. Furnell, 2008
    PDF
    Intelligent Systems for Science and Information: Extended and Selected Results from the Science and Information Conference 2013

    Intelligent Systems for Science and Information: Extended and Selected Results from the Science and Information Conference 2013

    Besim Mustafa, 2014
    PDF
    Intelligent Systems in Science and Information 2014: Extended and Selected Results from the Science and Information Conference 2014

    Intelligent Systems in Science and Information 2014: Extended and Selected Results from the Science and Information Conference 2014

    Kohei Arai, 2015
    PDF
    Annals of Cases on Information Technology (Cases on Information Technology Series, Vol 4, Part 1)

    Annals of Cases on Information Technology (Cases on Information Technology Series, Vol 4, Part 1)

    Mehdi Khosrowpour, 2002
    PDF
    Theory of Information: Fundamentality, Diversity and Unification (World Scientific Series in Information Studies)

    Theory of Information: Fundamentality, Diversity and Unification (World Scientific Series in Information Studies)

    Mark Burgin, 2009
    PDF
    Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark

    Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark

    A. K. Stanley (auth.), 1997
    |< ۳۶ ۳۷ ۳۸ ۳۹ ۴۰ ۴۱ ۴۲ ۴۳ ۴۴ ۴۵ ۴۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.