ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۵۱ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

    Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

    Mauro Barni, Franco Bartolini, 2004
    PDF
    Data Warehousing and Data Mining Techniques for Cyber Security

    Data Warehousing and Data Mining Techniques for Cyber Security

    Anoop Singhal, 2007
    PDF
    Terrorism Informatics - Knowledge Management and Data Mining for Homeland Security

    Terrorism Informatics - Knowledge Management and Data Mining for Homeland Security

    Hsinchun Chen, Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor, 2008
    PDF
    Vehicle Safety Communications: Protocols, Security, and Privacy

    Vehicle Safety Communications: Protocols, Security, and Privacy

    Luca Delgrossi, Tao Zhang(auth.), T. Russell Hsing, Vincent K. N. Lau(eds.)
    PDF
    Vehicle Safety Communications: Protocols, Security, and Privacy

    Vehicle Safety Communications: Protocols, Security, and Privacy

    Tao Zhang, Luca Delgrossi, 2012
    PDF
    Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

    Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

    Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.), 2014
    PDF
    Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)

    Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)

    Laura L. Pullum, 2001
    PDF
    Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science Security and Cryptology)

    Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science Security and Cryptology)

    Henri Gilbert
    DJVU
    Computer Viruses and Malware (Advances in Information Security)

    Computer Viruses and Malware (Advances in Information Security)

    John Aycock, 2006
    DJVU
    Computer Viruses and Malware (Advances in Information Security)

    Computer Viruses and Malware (Advances in Information Security)

    John Aycock, 2006
    PDF
    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 ... Computer Science / Security and Cryptology)

    Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 ... Computer Science / Security and Cryptology)

    Bernhard Hämmerli, Robin Sommer, 2007
    PDF
    Advances in Computer Science - ASIAN 2009. Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings

    Advances in Computer Science - ASIAN 2009. Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings

    Jean Goubault-Larrecq (auth.), Anupam Datta (eds.), 2009
    PDF
    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
    PDF
    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
    PDF
    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Taizo Shirai, Bart Preneel (auth.), Pil Joong Lee (eds.), 2004
    PDF
    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Pascal Paillier, Damien Vergnaud (auth.), Bimal Roy (eds.), 2005
    PDF
    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
    PDF
    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
    PDF
    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
    PDF
    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

    Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger (auth.), Masayuki Abe (eds.), 2010
    PDF
    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

    Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.), 2013
    PDF
    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

    Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

    Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.), 2013
    PDF
    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
    PDF
    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
    PDF
    Afghanistan Security

    Afghanistan Security

    Lawrence B. Peabody, 2009
    |< ۴۶ ۴۷ ۴۸ ۴۹ ۵۰ ۵۱ ۵۲ ۵۳ ۵۴ ۵۵ ۵۶ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.