ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۴۳۳ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Personal Security Guidelines. Template

    Personal Security Guidelines. Template

    Bob Hayes (Eds.), 2013
    PDF
    Israel's Security and Its Arab Citizens

    Israel's Security and Its Arab Citizens

    Professor Hillel Frisch, 2011
    PDF
    Implementing Homeland Security for Enterprise IT

    Implementing Homeland Security for Enterprise IT

    Michael Erbschloe (Auth.), 2004
    PDF
    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Michaël Quisquater (auth.), 2012
    PDF
    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday

    Michaël Quisquater (auth.), 2012
    PDF
    Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

    Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

    Michael Reiter, 2015
    PDF
    Computer Safety, Reliability and Security: 17th International Conference, SAFECOMP’98 Heidelberg, Germany, October 5–7, 1998 Proceedings

    Computer Safety, Reliability and Security: 17th International Conference, SAFECOMP’98 Heidelberg, Germany, October 5–7, 1998 Proceedings

    Kevin Hollingworth, 1998
    PDF
    Computer Safety, Reliability, and Security: 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings

    Computer Safety, Reliability, and Security: 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005. Proceedings

    Jose Antonio Fonseca (auth.), 2005
    PDF
    Testing Code Security

    Testing Code Security

    Maura A. van der Linden, 2007
    PDF
    Nation-Building and Stability Operations: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Nation-Building and Stability Operations: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Cynthia A. Watson, 2007
    PDF
    Sustainable Wealth: Achieve Financial Security in a Volatile World of Debt and Consumption

    Sustainable Wealth: Achieve Financial Security in a Volatile World of Debt and Consumption

    Axel Merk, 2009
    PDF
    The end of energy : the unmaking of America's environment, security, and independence

    The end of energy : the unmaking of America's environment, security, and independence

    Graetz, 2011
    PDF
    The end of energy : the unmaking of America's environment, security, and independence

    The end of energy : the unmaking of America's environment, security, and independence

    Graetz, 2011
    PDF
    The End of Energy: The Unmaking of America's Environment, Security, and Independence

    The End of Energy: The Unmaking of America's Environment, Security, and Independence

    Michael J. Graetz, 2011
    PDF
    The End of Energy: The Unmaking of America's Environment, Security, and Independence

    The End of Energy: The Unmaking of America's Environment, Security, and Independence

    Michael J. Graetz, 2011
    EPUB
    Googling Security: How Much Does Google Know About You?

    Googling Security: How Much Does Google Know About You?

    Greg Conti, 2008
    PDF
    Practitioner's Guide to Effective Maritime and Port Security

    Practitioner's Guide to Effective Maritime and Port Security

    Michael Edgerton
    PDF
    Hitler's Bureaucrats: The Nazi Security Police and the Banality of Evil

    Hitler's Bureaucrats: The Nazi Security Police and the Banality of Evil

    Yaacov Lozowick, 2005
    PDF
    Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 – July 3, 2014. Proceedings

    Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 – July 3, 2014. Proceedings

    Anna Sperotto, 2014
    PDF
    UN Peace Operations and Asian Security

    UN Peace Operations and Asian Security

    Mely Cabellero-anthony, 2005
    PDF
    Nanostructured Materials for Advanced Technological Applications (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Nanostructured Materials for Advanced Technological Applications (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Johann Reithmaier, 2009
    DJVU
    Nanostructured Materials for Advanced Technological Applications (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Nanostructured Materials for Advanced Technological Applications (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Johann Reithmaier, 2009
    PDF
    Securing Hadoop: Implement robust end-to-end security for your Hadoop ecosystem

    Securing Hadoop: Implement robust end-to-end security for your Hadoop ecosystem

    Sudheesh Narayanan, 2013
    PDF
    Designing and Building Security Operations Center

    Designing and Building Security Operations Center

    David Nathans, 2014
    PDF
    Rational Choice and Security Studies: Stephen Walt and His Critics

    Rational Choice and Security Studies: Stephen Walt and His Critics

    Michael E. Brown, 2000
    |< ۴۲۸ ۴۲۹ ۴۳۰ ۴۳۱ ۴۳۲ ۴۳۳ ۴۳۴ ۴۳۵ ۴۳۶ ۴۳۷ ۴۳۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.