ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۶۸ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Transportation security. / Volume 9, Guidelines for transportation emergency training exercises

    Transportation security. / Volume 9, Guidelines for transportation emergency training exercises

    McCormick Taylor (Firm);United States. Federal Transit Administration.;United States. Federal Highway Administration.;National Research Council (U.S.). Transportation Research Board.;National Cooperative Highway Research Program.;All authors, 2006
    PDF
    Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings

    Emerging Management Mechanisms for the Future Internet: 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings

    Vitor Pereira, Miguel Rocha, Paulo Cortez, Miguel Rio, Pedro Sousa (auth.), Guillaume Doyen, Martin Waldburger, Pavel Čeleda, Anna Sperotto, Burkhard Stiller (eds.), 2013
    PDF
    Hitler’s Personal Security

    Hitler’s Personal Security

    Peter Hoffmann (auth.), 1979
    PDF
    Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers

    Advanced Computing, Networking and Security: International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers

    Abhishek Parakh, Subhash Kak (auth.), P. Santhi Thilagam, Alwyn Roshan Pais, K. Chandrasekaran, N. Balakrishnan (eds.), 2012
    PDF
    Availability, Reliability and Security for Business, Enterprise and Health Information Systems: IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings

    Availability, Reliability and Security for Business, Enterprise and Health Information Systems: IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings

    Jostein Jensen (auth.), A Min Tjoa, Gerald Quirchmayr, Ilsun You, Lida Xu (eds.), 2011
    PDF
    Certification and Security in Health-Related Web Applications: Concepts and Solutions

    Certification and Security in Health-Related Web Applications: Concepts and Solutions

    Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis, 2010
    PDF
    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
    PDF
    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings

    Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.), 2010
    PDF
    Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

    Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings

    R. Sekar (auth.), Yingjiu Li (eds.), 2011
    PDF
    Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

    Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings

    Leendert van der Torre (auth.), Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.), 2012
    PDF
    Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings

    Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings

    Vijay Atluri, Günther Pernul (eds.), 2014
    PDF
    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
    PDF
    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings

    Joachim Biskup, Jens Seiler, Torben Weibert (auth.), Ehud Gudes, Jaideep Vaidya (eds.), 2009
    PDF
    Developer's Guide to Web Application Security

    Developer's Guide to Web Application Security

    Michael Cross, 2007
    PDF
    Developer's Guide to Web Application Security

    Developer's Guide to Web Application Security

    Michael Cross, 2007
    PDF
    Developer's guide to web application security

    Developer's guide to web application security

    Michael Cross, 2007
    PDF
    Developer's Guide to Web Application Security

    Developer's Guide to Web Application Security

    Michael Cross, 2007
    PDF
    Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings

    Future Data and Security Engineering: First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings

    Tran Khanh Dang, Roland Wagner, Erich Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai (eds.), 2014
    CHM
    Java Security Solutions

    Java Security Solutions

    Rich Helton, Johennie Helton, 2002
    PDF
    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    Tobias Klein, 2011
    EPUB
    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

    Tobias Klein, 2011
    PDF
    Building Global Security Through Cooperation: Annals of Pugwash 1989

    Building Global Security Through Cooperation: Annals of Pugwash 1989

    Richard Garwin (auth.), Professor Dr. Joseph Rotblat, Professor John P. Holdren (eds.), 1990
    PDF
    A Theory of Security Strategy for Our Time: Defensive Realism

    A Theory of Security Strategy for Our Time: Defensive Realism

    Shiping Tang, 2010
    PDF
    A Theory of Security Strategy for Our Time: Defensive Realism

    A Theory of Security Strategy for Our Time: Defensive Realism

    Shiping Tang (auth.), 2010
    PDF
    Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science)

    Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings (Communications in Computer and Information Science)

    Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
    |< ۶۳ ۶۴ ۶۵ ۶۶ ۶۷ ۶۸ ۶۹ ۷۰ ۷۱ ۷۲ ۷۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.