ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Safety And Security، صفحه ۴۳ از ۱۸,۴۷۲ در بین ۴۶۱,۷۹۲ کتاب.
    PDF
    Practical internet of things security : design a security framework for an Internet connected ecosystem

    Practical internet of things security : design a security framework for an Internet connected ecosystem

    Brian Russell; Drew Van Duren, 2018
    PDF
    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Android Security Internals: An In-Depth Guide to Android's Security Architecture

    Nikolay Elenkov, 2014
    PDF
    Basic Politics of Movement Security: A Talk on Security with J. Sakai + G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks

    Basic Politics of Movement Security: A Talk on Security with J. Sakai + G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks

    J. Sakai; Mandy Hiscocks, 2014
    EPUB
    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines

    Resource, Cyber Security, 2021
    PDF
    Comptia Security+ Guide to Network Security Fundamentals

    Comptia Security+ Guide to Network Security Fundamentals

    Mark Ciampa, 2021
    PDF
    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

    The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments

    Douglas Landoll, 2021
    PDF
    Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II

    Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II

    Elisa Bertino, Haya Shulman, Michael Waidner, 2021
    EPUB
    Core Software Security: Security at the Source

    Core Software Security: Security at the Source

    James Ransome, Anmol Misra, 2013
    PDF
    Rights As Security: The Theoretical Basis Of Security Of Person

    Rights As Security: The Theoretical Basis Of Security Of Person

    Rhonda Powell, 2019
    EPUB
    Governing Security After War: The Politics of Institutional Change in the Security Sector

    Governing Security After War: The Politics of Institutional Change in the Security Sector

    Louis-Alexandre Berg, 2022
    PDF
    PRAGMATIC Security Metrics: Applying Metametrics to Information Security

    PRAGMATIC Security Metrics: Applying Metametrics to Information Security

    W. Krag Brotby, Gary Hinson, 2013
    PDF
    Offensive Security - BackTrack to the Max Cracking the Perimeter V

    Offensive Security - BackTrack to the Max Cracking the Perimeter V

    Offensive Security, 2008
    EPUB
    CIS Critical Security Controls

    CIS Critical Security Controls

    Center for Internet Security, 2021
    PDF
    Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy

    Terrorism: Commentary on Security Documents Volume 147: Assessing the 2017 U.S. National Security Strategy

    Douglas C. Lovelace Jr. (editor), 2018
    PDF
    Connected Places: cyber security principles.

    Connected Places: cyber security principles.

    National Cyber Security Centre
    EPUB
    Victims as Security Threats: Refugee Impact on Host State Security in Africa

    Victims as Security Threats: Refugee Impact on Host State Security in Africa

    Edward Mogire, 2016
    EPUB
    The Changing Dimensions of Security: India's Security Policy Options

    The Changing Dimensions of Security: India's Security Policy Options

    Suresh R., 2015
    EPUB
    International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors

    U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation, 2017
    PDF
    Rethinking Energy Security in Asia: A Non-Traditional View of Human Security

    Rethinking Energy Security in Asia: A Non-Traditional View of Human Security

    Mely Caballero-Anthony, Swee Lean Collin Koh (auth.), Mely Caballero-Anthony, Youngho Chang, Nur Azha Putra (eds.), 2012
    EPUB
    Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform

    Building Security in Post-Conflict States: The Domestic Consequences of Security Sector Reform

    Ursula C. Schroeder, Fairlie Chappuis, 2015
    PDF
    Security Analytics: A Data Centric Approach to Information Security

    Security Analytics: A Data Centric Approach to Information Security

    Mehak Khurana, Shilpa Mahajan, 2022
    PDF
    Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States

    Climate Security in the Anthropocene: Exploring the Approaches of United Nations Security Council Member-States

    Judith Nora Hardt, Cameron Harrington, Franziskus von Lucke, Adrien Estève, Nick P. Simpson, 2023
    EPUB
    Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security

    Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security

    Redouane MEDDANE, 2022
    PDF
    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science)

    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science)

    Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor), 2024
    PDF
    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science)

    Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science)

    Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor), 2024
    |< ۳۸ ۳۹ ۴۰ ۴۱ ۴۲ ۴۳ ۴۴ ۴۵ ۴۶ ۴۷ ۴۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.