ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۶ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Advanced Water Supply and Wastewater Treatment: A Road to Safer Society and Environment (NATO Science for Peace and Security Series C: Environmental Security)

    Advanced Water Supply and Wastewater Treatment: A Road to Safer Society and Environment (NATO Science for Peace and Security Series C: Environmental Security)

    Petr Hlavinek, Igor Winkler, Jiri Marsalek, Ivana Mahrikova, 2011
    PDF
    Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

    Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

    Ladjel Bellatreche, 2006
    PDF
    China, the United States and South-East Asia: Contending Perspectives on Politics, Security and Economics (Asian Security Studies)

    China, the United States and South-East Asia: Contending Perspectives on Politics, Security and Economics (Asian Security Studies)

    SheldonSimon, 2007
    PDF
    Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)

    Damage Assessment and Reconstruction after War or Natural Disaster (NATO Science for Peace and Security Series C: Environmental Security)

    Adnan Ibrahimbegovic, Muhamed Zlatar, 2009
    PDF
    Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security

    Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security

    PDF
    Computer Incident Response and Product Security (Networking Technology: Security)

    Computer Incident Response and Product Security (Networking Technology: Security)

    Damir Rajnovic, 2010
    PDF
    Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

    Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

    Catherine Paquet, 2009
    PDF
    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

    PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

    Andre Karamanian, Srinivas Tenneti, Francois Dessart, 2011
    PDF
    Security Monitoring with Cisco Security MARS

    Security Monitoring with Cisco Security MARS

    Gary Halleen, Greg Kellogg, 2007
    PDF
    Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544)

    Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544)

    Tesch, Dale.; Greg Abelar, 2007
    CHM
    Security Threat Mitigation and Response: Understanding Cisco Security MARS

    Security Threat Mitigation and Response: Understanding Cisco Security MARS

    Dale Tesch, Greg Abelar, 2006
    PDF
    IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions

    IT Security Risk Management in the Context of Cloud Computing: Towards an Understanding of the Key Role of Providers’ IT Security Risk Perceptions

    André Loske (auth.), 2015
    PDF
    Rescue of Sturgeon Species in the Ural River Basin (NATO Science for Peace and Security Series C: Environmental Security)

    Rescue of Sturgeon Species in the Ural River Basin (NATO Science for Peace and Security Series C: Environmental Security)

    V. Lagutov, 2008
    PDF
    Biofuels and Food Security: Biofuel Impact on Food Security in Brazil, Asia and Major Producing Countries

    Biofuels and Food Security: Biofuel Impact on Food Security in Brazil, Asia and Major Producing Countries

    Tatsuji Koizumi (auth.), 2014
    PDF
    Convergence of Food Security, Energy Security and Sustainable Agriculture

    Convergence of Food Security, Energy Security and Sustainable Agriculture

    David D. Songstad, Jerry L. Hatfield, Dwight T. Tomes (eds.), 2014
    PDF
    Crop Biosecurity: Assuring our Global Food Supply (NATO Science for Peace and Security Series C: Environmental Security)

    Crop Biosecurity: Assuring our Global Food Supply (NATO Science for Peace and Security Series C: Environmental Security)

    Maria Lodovica Gullino, Jacqueline Fletcher, Abraham Gamliel, James Peter Stack, 2008
    PDF
    Global Food Security Governance: Civil society engagement in the reformed Committee on World Food Security

    Global Food Security Governance: Civil society engagement in the reformed Committee on World Food Security

    Jessica Duncan, 2015
    PDF
    The Politics of Food: The Global Conflict between Food Security and Food Sovereignty (Praeger Security International)

    The Politics of Food: The Global Conflict between Food Security and Food Sovereignty (Praeger Security International)

    William D. Schanbacher, 2010
    PDF
    Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)

    Threats to Food and Water Chain Infrastructure (NATO Science for Peace and Security Series C: Environmental Security)

    Virginia Koukouliou, Magdalena Ujevic, Otto Premstaller, 2009
    PDF
    Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings

    Availability, Reliability, and Security in Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings

    Stephanie Teufel, Tjoa A Min, Ilsun You, Edgar Weippl (eds.), 2014
    PDF
    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
    PDF
    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings

    Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck (auth.), Sushil Jajodia, Duminda Wijesekera (eds.), 2005
    PDF
    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

    Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

    Steve Barker (auth.), Vijay Atluri (eds.), 2008
    PDF
    GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures

    GlassFish Security: Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures

    Masoud Kalali, 2010
    PDF
    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

    Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

    David R. Miller, Michael Gregg, 2007
    |< ۱ ۲ ۳ ۴ ۵ ۶ ۷ ۸ ۹ ۱۰ ۱۱ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.