ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۴۴۱ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    NATO and the Quest for Post-Cold War Security

    NATO and the Quest for Post-Cold War Security

    Clay Clemens (eds.), 1997
    PDF
    NATO and Collective Security

    NATO and Collective Security

    Michael Brenner (eds.), 1998
    PDF
    Beyond UN Subcontracting: Task-Sharing with Regional Security Arrangements and Service-Providing NGOs

    Beyond UN Subcontracting: Task-Sharing with Regional Security Arrangements and Service-Providing NGOs

    Thomas G. Weiss (eds.), 1998
    PDF
    The New South Africa: Prospects for Domestic and International Security

    The New South Africa: Prospects for Domestic and International Security

    F. H. Toase, E. J. Yorke (eds.), 1998
    PDF
    Managing Risk and Information Security: Protect to Enable

    Managing Risk and Information Security: Protect to Enable

    Malcolm W. Harkins (auth.), 2016
    PDF
    Enterprise Mac Security: El Capitan

    Enterprise Mac Security: El Capitan

    Charles Edge, Daniel O’Donnell (auth.), 2016
    PDF
    Kalevi Holsti: A Pioneer in International Relations Theory, Foreign Policy Analysis, History of International Order, and Security Studies

    Kalevi Holsti: A Pioneer in International Relations Theory, Foreign Policy Analysis, History of International Order, and Security Studies

    Kalevi Holsti (auth.), 2016
    PDF
    Intelligence and Security Oversight : An Annotated Bibliography and Comparative Analysis

    Intelligence and Security Oversight : An Annotated Bibliography and Comparative Analysis

    Sophie Richardson, Nicholas Gilmour (auth.), 2016
    PDF
    Global Visions of Olof Palme, Bruno Kreisky and Willy Brandt : International Peace and Security, Co-operation, and Development

    Global Visions of Olof Palme, Bruno Kreisky and Willy Brandt : International Peace and Security, Co-operation, and Development

    B. Vivekanandan (auth.), 2016
    PDF
    The Law of Nations and Britain’s Quest for Naval Security: International Law and Arms Control, 1898–1914

    The Law of Nations and Britain’s Quest for Naval Security: International Law and Arms Control, 1898–1914

    Scott Andrew Keefer (auth.), 2016
    PDF
    Ten Laws for Security

    Ten Laws for Security

    Eric Diehl (auth.), 2016
    PDF
    Rapid Urbanisation, Urban Food Deserts and Food Security in Africa

    Rapid Urbanisation, Urban Food Deserts and Food Security in Africa

    Jonathan Crush, Jane Battersby (eds.), 2016
    PDF
    Trust, Privacy and Security in Digital Business: 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings

    Trust, Privacy and Security in Digital Business: 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings

    Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell (eds.), 2016
    PDF
    Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings

    Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings

    Vassilis Zikas, Roberto De Prisco (eds.), 2016
    PDF
    Competitiveness of Global Agriculture: Policy Lessons for Food Security

    Competitiveness of Global Agriculture: Policy Lessons for Food Security

    Attila Jambor, Suresh Babu (auth.), 2016
    PDF
    Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices

    Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices

    Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas (auth.), 2016
    PDF
    Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings

    Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings

    Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.), 2016
    PDF
    Computer Safety, Reliability, and Security: SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings

    Computer Safety, Reliability, and Security: SAFECOMP 2016 Workshops, ASSURE, DECSoS, SASSUR, and TIPS, Trondheim, Norway, September 20, 2016, Proceedings

    Amund Skavhaug, Jérémie Guiochet, Erwin Schoitsch, Friedemann Bitsch (eds.), 2016
    PDF
    Information Security: 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings

    Information Security: 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings

    Matt Bishop, Anderson C A Nascimento (eds.), 2016
    PDF
    Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings

    Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings

    Sara Foresti, Javier Lopez (eds.), 2016
    PDF
    VLSI-SoC: Design for Reliability, Security, and Low Power: 23rd IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2015, Daejeon, Korea, October 5-7, 2015, Revised Selected Papers

    VLSI-SoC: Design for Reliability, Security, and Low Power: 23rd IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2015, Daejeon, Korea, October 5-7, 2015, Revised Selected Papers

    Youngsoo Shin, Chi Ying Tsui, Jae-Joon Kim, Kiyoung Choi, Ricardo Reis (eds.), 2016
    PDF
    Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers

    Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers

    Barbara Kordy, Mathias Ekstedt, Dong Seong Kim (eds.), 2016
    PDF
    Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings

    Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings

    Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.), 2016
    PDF
    Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Gilles Barthe, Evangelos Markatos, Pierangela Samarati (eds.), 2016
    PDF
    Wireless Sensor Networks: Security, Coverage, and Localization

    Wireless Sensor Networks: Security, Coverage, and Localization

    Rastko R. Selmic, Vir V. Phoha, Abdul Serwadda (auth.), 2016
    |< ۴۳۶ ۴۳۷ ۴۳۸ ۴۳۹ ۴۴۰ ۴۴۱ ۴۴۲ ۴۴۳ ۴۴۴ ۴۴۵ ۴۴۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.