ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۶۹ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

    Advances in Security Technology: International Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

    Wen-Chung Kuo (auth.), Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.), 2009
    PDF
    Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

    Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

    Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.), 2015
    DJVU
    Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

    Computer Security and Industrial Cryptography: State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991

    Prof. Dr. B. De Schutter (auth.), Bart Preneel, René Govaerts, Joos Vandewalle (eds.), 1993
    PDF
    China's  Rising Sea Power (The PLA Navy's Submarine Challenge) (Asian Security Studies)

    China's Rising Sea Power (The PLA Navy's Submarine Challenge) (Asian Security Studies)

    Peter Howarth, 2006
    PDF
    CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

    CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

    Ido Dubrawsky, 2009
    PDF
    CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

    CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

    Ido Dubrawsky, Jeremy Faircloth, 2009
    PDF
    Eleventh Hour Security+: Exam SY0-201 Study Guide

    Eleventh Hour Security+: Exam SY0-201 Study Guide

    Ido Dubrawsky, 2009
    PDF
    Security+

    Security+

    Ido Dubrawsky (Auth.), 2007
    PDF
    Environmental Security and Public Safety: Problems and Needs in Conversion Policy and Research after 15 Years of Conversion in Central and Eastern Europe

    Environmental Security and Public Safety: Problems and Needs in Conversion Policy and Research after 15 Years of Conversion in Central and Eastern Europe

    Alexander Döring Dipl. Eng. (auth.), Wolfgang Spyra, Michael Katzsch (eds.), 2007
    PDF
    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
    PDF
    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings

    Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.), 2003
    PDF
    Computational Intelligence in Information Assurance and Security

    Computational Intelligence in Information Assurance and Security

    E. C. Laskari, G. C. Meletiou (auth.), Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (eds.), 2007
    PDF
    Computational Social Networks: Security and Privacy

    Computational Social Networks: Security and Privacy

    Mostafa Salama, Mrutyunjaya Panda, Yomna Elbarawy, Aboul Ella Hassanien, Ajith Abraham (auth.), Ajith Abraham (eds.), 2012
    PDF
    State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures

    State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures

    Bart De Schutter (auth.), 1998
    PDF
    Cryptography & Network Security (McGraw-Hill Forouzan Networking)

    Cryptography & Network Security (McGraw-Hill Forouzan Networking)

    Behrouz Forouzan, 2007
    PDF
    Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings

    Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification: First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings

    Thierry Lecomte, Ralf Pinger, Alexander Romanovsky (eds.), 2016
    PDF
    American Biodefense: How Dangerous Ideas about Biological Weapons Shape National Security

    American Biodefense: How Dangerous Ideas about Biological Weapons Shape National Security

    Frank L. Smith III, 2014
    PDF
    Network Security with OpenSSL

    Network Security with OpenSSL

    John Viega, Matt Messier, Pravir Chandra, 2002
    PDF
    Network Security with OpenSSL

    Network Security with OpenSSL

    John Viega, Matt Messier, Pravir Chandra, 2002
    DJVU
    Network Security with OpenSSL

    Network Security with OpenSSL

    John Viega, Matt Messier, Pravir Chandra, 2002
    PDF
    Enterprise Mac Security: Mac OS X Snow Leopard

    Enterprise Mac Security: Mac OS X Snow Leopard

    Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
    PDF
    Enterprise Mac Security: Mac OS X Snow Leopard

    Enterprise Mac Security: Mac OS X Snow Leopard

    Charles Edge, William Barker, Beau Hunter, Gene Sullivan (auth.), 2010
    PDF
    Enterprise Mac Security: Mac OS X Snow Leopard, 2nd Edition

    Enterprise Mac Security: Mac OS X Snow Leopard, 2nd Edition

    Charles Edge, William Barker, Beau Hunter, Gene Sullivan, 2010
    PDF
    Security Technology: International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings

    Security Technology: International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings

    Ju-Sung Kang, Dowon Hong (auth.), Tai-hoon Kim, Hojjat Adeli, Wai-chi Fang, Javier García Villalba, Kirk P. Arnett, Muhammad Khurram Khan (eds.), 2011
    PDF
    Computer Safety, Reliability, and Security: 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings

    Computer Safety, Reliability, and Security: 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings

    Willem Ridderhof, Hans-Gerhard Gross, Heiko Doerr (auth.), Francesca Saglietti, Norbert Oster (eds.), 2007
    |< ۶۴ ۶۵ ۶۶ ۶۷ ۶۸ ۶۹ ۷۰ ۷۱ ۷۲ ۷۳ ۷۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.