ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Algorithms And Data Structures: Cryptography، صفحه ۴۷ از ۱۸,۶۷۲ در بین ۴۶۶,۷۹۱ کتاب.
    EPUB
    The Digital Mindset: What It Really Takes to Thrive in the Age of Data, Algorithms, and AI

    The Digital Mindset: What It Really Takes to Thrive in the Age of Data, Algorithms, and AI

    Paul Leonardi, 2022
    EPUB
    Graphic JavaScript Algorithms: Graphic learn Data Structure and Algorithm for JavaScript

    Graphic JavaScript Algorithms: Graphic learn Data Structure and Algorithm for JavaScript

    Yang Hu, 2020
    PDF
    Demystifying Graph Data Science: Graph algorithms, analytics methods, platforms, databases, and use cases

    Demystifying Graph Data Science: Graph algorithms, analytics methods, platforms, databases, and use cases

    Pethuru Raj, Abhishek Kumar, Vicente García Díaz, Nachamai Muthuraman Sundar, 2022
    PDF
    Machine Learning in Chemistry: Data-Driven Algorithms, Learning Systems, and Predictions

    Machine Learning in Chemistry: Data-Driven Algorithms, Learning Systems, and Predictions

    Edward O. Pyzer-Knapp (editor), Teodoro Laino (editor), 2020
    PDF
    Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2022 (Algorithms for Intelligent Systems)

    Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2022 (Algorithms for Intelligent Systems)

    Amar Ramdane-Cherif (editor), T. P. Singh (editor), Ravi Tomar (editor), Tanupriya Choudhury (editor), Jung-Sup Um (editor), 2023
    EPUB
    Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2022 (Algorithms for Intelligent Systems)

    Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2022 (Algorithms for Intelligent Systems)

    Amar Ramdane-Cherif (editor), T. P. Singh (editor), Ravi Tomar (editor), Tanupriya Choudhury (editor), Jung-Sup Um (editor), 2023
    PDF
    Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2022 (Algorithms for Intelligent Systems)

    Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2022 (Algorithms for Intelligent Systems)

    I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Ivan Izonin (editor), 2022
    PDF
    Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023 (Algorithms for Intelligent Systems)

    Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023 (Algorithms for Intelligent Systems)

    I. Jeena Jacob (editor), Selwyn Piramuthu (editor), Przemyslaw Falkowski-Gilski (editor), 2024
    PDF
    Cryptography and Security Services: Mechanisms and Applications

    Cryptography and Security Services: Mechanisms and Applications

    Manuel Mogollon, 2008
    PDF
    Cryptography and Security Services: Mechanisms and Applications

    Cryptography and Security Services: Mechanisms and Applications

    Manuel Mogollon, 2008
    PDF
    Cryptography and Network Security: Principles and Practice

    Cryptography and Network Security: Principles and Practice

    William Stallings, 2014
    PDF
    Quantum Information, Computation and Cryptography: An Introductory Survey of Theory, Technology and Experiments

    Quantum Information, Computation and Cryptography: An Introductory Survey of Theory, Technology and Experiments

    D. Petz (auth.), Fabio Benatti, Mark Fannes, Roberto Floreanini, Dimitri Petritis (eds.), 2010
    PDF
    Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation: In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman

    Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation: In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman

    Oded Goldreich (auth.), Oded Goldreich (eds.), 2011
    PDF
    Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation: In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman

    Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation: In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman

    Oded Goldreich (auth.), Oded Goldreich (eds.), 2011
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Manfred Schroeder (auth.), 2009
    DJVU
    Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

    Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

    Prof. Dr. B. De Schutter (auth.), Bart Preneel, René Govaerts, Joos Vandewalle (eds.), 1993
    PDF
    Algebraic Curves and Finite Fields: Cryptography and Other Applications

    Algebraic Curves and Finite Fields: Cryptography and Other Applications

    Harald Niederreiter, Alina Ostafe, Daniel Panario, Arne Winterhof (eds.), 2014
    PDF
    Theory of Quantum Computation, Communication and Cryptography: 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers (Lecture ... Computer Science and General Issues)

    Theory of Quantum Computation, Communication and Cryptography: 5th Conference, TQC 2010, Leeds, UK, April 13-15, 2010, Revised Selected Papers (Lecture ... Computer Science and General Issues)

    Wim van Dam, 2011
    PDF
    Foundations of Coding: Theory and Applications of Error-Correcting Codes with an Introduction to Cryptography and Information Theory

    Foundations of Coding: Theory and Applications of Error-Correcting Codes with an Introduction to Cryptography and Information Theory

    Jiri Adamek(auth.), 1991
    CHM
    Cryptography and Network Security Principles and Practices

    Cryptography and Network Security Principles and Practices

    William Stallings, 2005
    PDF
    Cryptography and Network Security: Principles and Practice

    Cryptography and Network Security: Principles and Practice

    William Stallings, 2014
    PDF
    Cryptography and Network Security: Principles and Practice (5th Edition)

    Cryptography and Network Security: Principles and Practice (5th Edition)

    William Stallings, 2010
    PDF
    Cryptography and Network Security: Principles and Practice (6th Edition)

    Cryptography and Network Security: Principles and Practice (6th Edition)

    William Stallings, 2014
    PDF
    Wireless Security and Cryptography: Specifications and Implementations

    Wireless Security and Cryptography: Specifications and Implementations

    Nicolas Sklavos, 2007
    PDF
    Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)

    Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)

    Stelvio Cimato, 2011
    |< ۴۲ ۴۳ ۴۴ ۴۵ ۴۶ ۴۷ ۴۸ ۴۹ ۵۰ ۵۱ ۵۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.