ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۶۹ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Balancing Liberty and Security: Human Rights, Human Wrongs

    Balancing Liberty and Security: Human Rights, Human Wrongs

    Kate Moss (auth.), 2011
    PDF
    Security and Liberty: Restriction by Stealth

    Security and Liberty: Restriction by Stealth

    Kate Moss (auth.), 2009
    PDF
    Imaging for Forensics and Security: From Theory to Practice

    Imaging for Forensics and Security: From Theory to Practice

    Ahmed Bouridane (auth.), 2009
    PDF
    Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring

    Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring

    Harlan Carvey, 2007
    PDF
    Security Metrics. Replacing Fear, Uncertainty, and Doubt

    Security Metrics. Replacing Fear, Uncertainty, and Doubt

    Andrew Jaquith, 2007
    PDF
    Security Metrics: Replacing Fear, Uncertainty, and Doubt

    Security Metrics: Replacing Fear, Uncertainty, and Doubt

    Andrew Jaquith, 2007
    PDF
    Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series)

    Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series)

    Andrew Jaquith, 2007
    PDF
    Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

    Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

    John Hoopes, 2008
    PDF
    A Well-Tailored Safety Net: The Only Fair and Sensible Way to Save Social Security

    A Well-Tailored Safety Net: The Only Fair and Sensible Way to Save Social Security

    Jed Graham, 2009
    PDF
    Commentary on the United Nations Convention on the Rights of the Child, Article 26: The Right to Benefit from Social Security (Commentary on the United Nations Convention on the Rights of the Child.)

    Commentary on the United Nations Convention on the Rights of the Child, Article 26: The Right to Benefit from Social Security (Commentary on the United Nations Convention on the Rights of the Child.)

    Vandenhole, W., 2007
    PDF
    A Certain Idea of France: French Security Policy and Gaullist Legacy

    A Certain Idea of France: French Security Policy and Gaullist Legacy

    Philip H. Gordon, 1993
    PDF
    African Security Politics Redefined

    African Security Politics Redefined

    Karin Dokken, 2008
    PDF
    Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism

    Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism

    Bartholomew Elias, 2009
    PDF
    Arctic Doom, Arctic Boom: The Geopolitics of Climate Change in the Arctic (Security and the Environment)

    Arctic Doom, Arctic Boom: The Geopolitics of Climate Change in the Arctic (Security and the Environment)

    Barry Scott Zellen, 2009
    PDF
    Rethinking Security after the Cold War

    Rethinking Security after the Cold War

    Barry Buzan, 1997
    PDF
    Securitization Theory: How Security Problems Emerge and Dissolve

    Securitization Theory: How Security Problems Emerge and Dissolve

    Thierry Balzacq, 2010
    PDF
    The Maritime Dimension of European Security: Seapower and the European Union

    The Maritime Dimension of European Security: Seapower and the European Union

    Basil Germond, 2015
    PDF
    United States of America's Foreign Policy in the Security of Asia-Pacific Region

    United States of America's Foreign Policy in the Security of Asia-Pacific Region

    Nassef Manabilang Adiong, 2013
    PDF
    Critical Infrastructure: Homeland Security and Emergency Preparedness, Second Edition

    Critical Infrastructure: Homeland Security and Emergency Preparedness, Second Edition

    Robert Radvanovsky, Allan McDougall, 2009
    PDF
    Mobile and Wireless Network Security and Privacy

    Mobile and Wireless Network Security and Privacy

    S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki, 2007
    PDF
    Mobile and Wireless Network Security and Privacy

    Mobile and Wireless Network Security and Privacy

    S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki, 2007
    PDF
    Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings

    Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings

    Benjamin Johnson, Pascal Schöttle, Rainer Böhme (auth.), Jens Grossklags, Jean Walrand (eds.), 2012
    PDF
    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Yuanmi Chen, Phong Q. Nguyen (auth.), Dong Hoon Lee, Xiaoyun Wang (eds.), 2011
    PDF
    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

    Yuanmi Chen, Phong Q. Nguyen (auth.), Dong Hoon Lee, Xiaoyun Wang (eds.), 2011
    PDF
    Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

    Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

    Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park (auth.), Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo (eds.), 2009
    |< ۶۴ ۶۵ ۶۶ ۶۷ ۶۸ ۶۹ ۷۰ ۷۱ ۷۲ ۷۳ ۷۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.