ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۷۸ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings

    Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings

    Fuchun Guo, 2007
    PDF
    Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers

    Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers

    Rainer Böhme, 2015
    PDF
    Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings

    Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings

    Claus Peter Schnorr (auth.), 2001
    PDF
    Into the Long War: Oxford Research Group International Security Report 2006

    Into the Long War: Oxford Research Group International Security Report 2006

    Paul Rogers, 2006
    PDF
    Criminologists on Terrorism and Homeland Security (Cambridge Studies in Criminology)

    Criminologists on Terrorism and Homeland Security (Cambridge Studies in Criminology)

    Brian Forst (editor), 2011
    PDF
    Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

    Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

    Arjen K. Lenstra, 2002
    PDF
    Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

    Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

    Frank Siepmann, 2013
    PDF
    An Information Security Handbook

    An Information Security Handbook

    John M. D. Hunter BA (Hons), 2001
    PDF
    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Ueli Maurer (auth.), 2010
    PDF
    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

    Ueli Maurer (auth.), 2010
    PDF
    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Josep M. Miret, 2010
    PDF
    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

    Josep M. Miret, 2010
    PDF
    Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings

    Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings

    Facchinetti Gisella, 2003
    PDF
    Extreme Hydrological Events: New Concepts for Security

    Extreme Hydrological Events: New Concepts for Security

    O.F. Vasiliev, 2007
    PDF
    Extreme Hydrological Events: New Concepts for Security

    Extreme Hydrological Events: New Concepts for Security

    Vasiliev O.F., 2007
    PDF
    Extreme Hydrological Events: New Concepts for Security (NATO Science Series: IV: Earth and Environmental Sciences)

    Extreme Hydrological Events: New Concepts for Security (NATO Science Series: IV: Earth and Environmental Sciences)

    O.F. Vasiliev, 2007
    PDF
    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Assane Gueye, 2010
    PDF
    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

    Assane Gueye, 2010
    PDF
    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Joseph Y. Halpern (auth.), 2011
    PDF
    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings

    Joseph Y. Halpern (auth.), 2011
    PDF
    Security, Identity and Interests: A Sociology of International Relations (Cambridge Studies in International Relations)

    Security, Identity and Interests: A Sociology of International Relations (Cambridge Studies in International Relations)

    Bill McSweeney, 1999
    PDF
    Computer architecture and security: fundamentals of designing secure computer systems

    Computer architecture and security: fundamentals of designing secure computer systems

    Shuangbao (Paul) Wang, 2013
    PDF
    Security Metrics: Replacing Fear, Uncertainty, and Doubt

    Security Metrics: Replacing Fear, Uncertainty, and Doubt

    Andrew Jaquith, 2007
    PDF
    Computer Security

    Computer Security

    John M. Carroll (Auth.), 1987
    PDF
    It Security Project Management Handbook

    It Security Project Management Handbook

    S Snedaker, 2006
    |< ۷۳ ۷۴ ۷۵ ۷۶ ۷۷ ۷۸ ۷۹ ۸۰ ۸۱ ۸۲ ۸۳ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.