ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۶۸ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science / Security and Cryptology)

    Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, ... Computer Science / Security and Cryptology)

    Henri Gilbert, 2010
    DJVU
    Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

    Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

    Atsuko Miyaji (auth.), Kwangjo Kim, Tsutomu Matsumoto (eds.), 1996
    PDF
    Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

    Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

    Alex Biryukov, Adi Shamir (auth.), Tatsuaki Okamoto (eds.), 2000
    PDF
    Advances in Information Security and Its Application.. Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009

    Advances in Information Security and Its Application.. Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009

    Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-Hoon Kim, Sang-Soo Yeo, 2009
    PDF
    Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors

    Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors

    Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele, 2007
    PDF
    Aviation Security Law

    Aviation Security Law

    Dr. Ruwantissa Abeyratne (auth.), 2010
    PDF
    Career Opportunities In Law Enforcement, Security And Protective Services, 2nd Edition

    Career Opportunities In Law Enforcement, Security And Protective Services, 2nd Edition

    Susan Echaore-McDavid, 2005
    PDF
    A Matter of Security: The Application of Attachment Theory to Forensic Psychiatry and Psychotherapy (Forensic Focus)

    A Matter of Security: The Application of Attachment Theory to Forensic Psychiatry and Psychotherapy (Forensic Focus)

    Friedemann Pf¿fflin, Gwen Adshead, 2003
    PDF
    American National Security and Civil Liberties in an Era of Terrorism

    American National Security and Civil Liberties in an Era of Terrorism

    David B. Cohen, John W. Wells, 2004
    PDF
    An Introduction to Military Ethics: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    An Introduction to Military Ethics: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)

    Bill Rhodes, 2009
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2002
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2002
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    James Bamford, 2001
    PDF
    Error Correcting Coding and Security for Data Networks : Analysis of the Superchannel Concept

    Error Correcting Coding and Security for Data Networks : Analysis of the Superchannel Concept

    GrigoriiKabatiansky, 2005
    PDF
    A Classical Introduction to Cryptography: Applications for Communications Security

    A Classical Introduction to Cryptography: Applications for Communications Security

    Serge Vaudenay, 2005
    PDF
    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Assane Gueye, Jean C. Walrand, Venkat Anantharam (auth.), Tansu Alpcan, Levente Buttyán, John S. Baras (eds.), 2010
    PDF
    Advanced Materials and Technologies for Micro Nano-Devices, Sensors and Actuators (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Advanced Materials and Technologies for Micro Nano-Devices, Sensors and Actuators (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Evgeni Gusev, Eric Garfunkel, Arthur Dideikin, 2010
    PDF
    Biophysics and the Challenges of Emerging Threats (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Biophysics and the Challenges of Emerging Threats (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Joseph D. Puglisi, 2009
    PDF
    Boron Rich Solids: Sensors, Ultra High Temperature Ceramics, Thermoelectrics, Armor (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Boron Rich Solids: Sensors, Ultra High Temperature Ceramics, Thermoelectrics, Armor (NATO Science for Peace and Security Series B: Physics and Biophysics)

    Nina Orlovskaya, Mykola Lugovy, 2010
    PDF
    A Fearful Symmetry: The New Soldier in the Age of Asymmetric Conflict (Praeger Security International)

    A Fearful Symmetry: The New Soldier in the Age of Asymmetric Conflict (Praeger Security International)

    Rumu Sarkar Ph.D., 2010
    PDF
    Contagion and Chaos: Disease, Ecology, and National Security in the Era of Globalization

    Contagion and Chaos: Disease, Ecology, and National Security in the Era of Globalization

    Andrew T. Price-Smith, 2009
    PDF
    Towards health security : A discussion paper on recent health crises in the WHO European Region

    Towards health security : A discussion paper on recent health crises in the WHO European Region

    edited by Gerald Rockenschaub, Jukka Pukkila, and Maria Cristina Profili.
    PDF
    Balancing Liberty and Security: Human Rights, Human Wrongs

    Balancing Liberty and Security: Human Rights, Human Wrongs

    Kate Moss, 2011
    |< ۶۳ ۶۴ ۶۵ ۶۶ ۶۷ ۶۸ ۶۹ ۷۰ ۷۱ ۷۲ ۷۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.