ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۶۳ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Linux Security Cookbook

    Linux Security Cookbook

    Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, 2003
    EPUB
    Linux Security Cookbook

    Linux Security Cookbook

    Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, 2003
    PDF
    Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

    Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

    Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel,, 2007
    PDF
    Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

    Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

    Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel,, 2007
    PDF
    Climate Change and Food Security: Adapting Agriculture to a Warmer World

    Climate Change and Food Security: Adapting Agriculture to a Warmer World

    David Lobell, Marshall Burke (auth.), David Lobell, Marshall Burke (eds.), 2010
    PDF
    Climate Change and Food Security: Adapting Agriculture to a Warmer World

    Climate Change and Food Security: Adapting Agriculture to a Warmer World

    David Lobell, Marshall Burke (auth.), David Lobell, Marshall Burke (eds.), 2010
    PDF
    Nuclear Power Plant Instrumentation and Control Systems for Safety and Security

    Nuclear Power Plant Instrumentation and Control Systems for Safety and Security

    Michael Yastrebenetsky, Vyacheslav Kharchenko, 2014
    PDF
    A Classical Introduction to Cryptography - Applications for Communications Security

    A Classical Introduction to Cryptography - Applications for Communications Security

    Serge Vaudenay, 2005
    PDF
    A Classical Introduction to Cryptography: Applications for Communications Security

    A Classical Introduction to Cryptography: Applications for Communications Security

    Serge Vaudenay, 2005
    DJVU
    A Classical Introduction to Cryptography: Applications for Communications Security

    A Classical Introduction to Cryptography: Applications for Communications Security

    Serge Vaudenay, 2005
    PDF
    Designing Security Architecture Solutions

    Designing Security Architecture Solutions

    Jay Ramachandran, 2002
    PDF
    Public Security in the Negotiated State: Policing in Latin America and Beyond

    Public Security in the Negotiated State: Policing in Latin America and Beyond

    Markus-Michael Müller (auth.), 2012
    PDF
    Contemporary Security and Strategy

    Contemporary Security and Strategy

    Craig Snyder, 1999
    PDF
    Information Age Anthology: National Security Implications of the Information Age (Volume II)

    Information Age Anthology: National Security Implications of the Information Age (Volume II)

    David S. Alberts, Daniel S. Papp, 2000
    PDF
    Atmospheric Boundary Layers: Nature, Theory and Applications to Environmental Modelling and Security

    Atmospheric Boundary Layers: Nature, Theory and Applications to Environmental Modelling and Security

    Alexander Baklanov, Branko Grisogono, A. Baklanov, B. Grisogono, 2010
    PDF
    Atmospheric Boundary Layers: Nature, Theory and Applications to Environmental Modelling and Security

    Atmospheric Boundary Layers: Nature, Theory and Applications to Environmental Modelling and Security

    Alexander Baklanov, Branko Grisogono (auth.), Alexander Baklanov, Branko Grisogono (eds.), 2007
    PDF
    Atmospheric Boundary Layers: Nature, Theory, and Application to Environmental Modelling and Security

    Atmospheric Boundary Layers: Nature, Theory, and Application to Environmental Modelling and Security

    Alexander Baklanov, Branko Grisogono, 2007
    PDF
    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

    Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.), 2003
    PDF
    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

    Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.), 2008
    PDF
    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings

    Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro (auth.), Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.), 1999
    PDF
    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Advances in Cryptology – ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings

    Christophe De Cannière, Christian Rechberger (auth.), Xuejia Lai, Kefei Chen (eds.), 2006
    PDF
    Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

    Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings

    Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.), 2007
    DJVU
    Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings

    Advances in Cryptology – ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings

    Alex Biryukov, Dmitry Khovratovich (auth.), Mitsuru Matsui (eds.), 2009
    PDF
    ACM transactions on information and systems security (February)

    ACM transactions on information and systems security (February)

    2005
    PDF
    Certified Information Systems Security Professional. Student Guide

    Certified Information Systems Security Professional. Student Guide

    2005
    |< ۵۸ ۵۹ ۶۰ ۶۱ ۶۲ ۶۳ ۶۴ ۶۵ ۶۶ ۶۷ ۶۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.