ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Algorithms And Data Structures: Cryptography، صفحه ۴۹ از ۱۸,۶۷۲ در بین ۴۶۶,۷۹۱ کتاب.
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 2006
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1997
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity

    Professor Dr. Manfred R. Schroeder (auth.), 1986
    PDF
    Cryptography and network security principles and practice

    Cryptography and network security principles and practice

    Stallings, William, 2017
    PDF
    Arithmetic, Geometry, Cryptography and Coding Theory: 13th Conference Arithmetic, Geometry, Crytography and Coding Theory Cirm, Marseille, France, ... France, June 19

    Arithmetic, Geometry, Cryptography and Coding Theory: 13th Conference Arithmetic, Geometry, Crytography and Coding Theory Cirm, Marseille, France, ... France, June 19

    Yves Aubry, Christophe Ritzenthaler, Alexey Zykin, 2012
    PDF
    Algebraic Curves and Finite Fields: Cryptography and Other Applications

    Algebraic Curves and Finite Fields: Cryptography and Other Applications

    Harald Niederreiter, Alina Ostafe, Daniel Panario, Arne Winterhof(eds.), 2014
    PDF
    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Biology, Digital Information, and Computing

    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Biology, Digital Information, and Computing

    Manfred R. Schroeder, 1985
    PDF
    Arithmetic Geometry: Computation and Applications: 16th International Conference on Arithmetic, Geometry, Cryptography, and Coding Theory, June 19-23, 2017, Centre International de Rencontres Mathematiques, Marseille, France

    Arithmetic Geometry: Computation and Applications: 16th International Conference on Arithmetic, Geometry, Cryptography, and Coding Theory, June 19-23, 2017, Centre International de Rencontres Mathematiques, Marseille, France

    Yves Aubry; Everett W. Howe; Christophe Ritzenthaler, 2019
    PDF
    Cryptography and Network Security: Principles and Practice: United States Edition

    Cryptography and Network Security: Principles and Practice: United States Edition

    William Stallings, 2010
    PDF
    A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy

    A Material History of Medieval and Early Modern Ciphers: Cryptography and the History of Literacy

    Katherine Ellison (editor), Susan Kim (editor), 2017
    PDF
    Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings: 386 ... and Telecommunications Engineering, 386)

    Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings: 386 ... and Telecommunications Engineering, 386)

    Bo Chen, Xinyi Huang, 2021
    EPUB
    Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)

    Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)

    Yan Lin, 2021
    PDF
    Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)

    Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography)

    Yan Lin, 2021
    EPUB
    Cryptography and Network Security: Principles and Practice, 8/e

    Cryptography and Network Security: Principles and Practice, 8/e

    William Stallings, 2019
    EPUB
    The Currency Cold War: Cash and Cryptography, Hash Rates and Hegemony

    The Currency Cold War: Cash and Cryptography, Hash Rates and Hegemony

    David Birch, 2020
    PDF
    Cryptography and Network Security: Principles and Practice

    Cryptography and Network Security: Principles and Practice

    William Stallings, 2019
    PDF
    Cryptography and Network Security: Principles and Practice, Global Edition

    Cryptography and Network Security: Principles and Practice, Global Edition

    William Stallings, 2022
    PDF
    Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications

    Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications

    Feng Liu; Wei Qi Yan, 2015
    EPUB
    Mastering Blockchain: Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3, 4th Edition

    Mastering Blockchain: Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3, 4th Edition

    Imran Bashir
    PDF
    Cryptography and Coding: 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings (Security and Cryptology)

    Cryptography and Coding: 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings (Security and Cryptology)

    Maura B. Paterson (editor), 2021
    DJVU
    A VLSI Architecture for Concurrent Data Structures

    A VLSI Architecture for Concurrent Data Structures

    J. W. Dally, 1987
    PDF
    A VLSI Architecture for Concurrent Data Structures

    A VLSI Architecture for Concurrent Data Structures

    William J. Dally (auth.), 1987
    PDF
    A Laboratory Course in C++ Data Structures, Second Edition

    A Laboratory Course in C++ Data Structures, Second Edition

    James Roberge, 2003
    PDF
    Data Structures for Game Programmers

    Data Structures for Game Programmers

    Ron Penton, 2002
    PDF
    Data Structures In Java: A Laboratory Course

    Data Structures In Java: A Laboratory Course

    Sandra Andersen, 2002
    |< ۴۴ ۴۵ ۴۶ ۴۷ ۴۸ ۴۹ ۵۰ ۵۱ ۵۲ ۵۳ ۵۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.