ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Mercury Learning And Information، صفحه ۸۲ از ۱۸,۷۱۴ در بین ۴۶۷,۸۳۵ کتاب.
    PDF
    Convergence in Information and Communication Technology: Strategic and Regulatory Considerations

    Convergence in Information and Communication Technology: Strategic and Regulatory Considerations

    Rajendra Singh, Siddhartha Raja, 2010
    PDF
    Global Technology and Corporate Crisis: Strategies, Planning and Communication in the Information Age

    Global Technology and Corporate Crisis: Strategies, Planning and Communication in the Information Age

    S. Moore, 2005
    PDF
    Good Practices in Information and Communication Technology Policies in Asia and the Pacific: Promotion of Enabling Policies & Regulatory Frameworks for ... & Communication Technology Development

    Good Practices in Information and Communication Technology Policies in Asia and the Pacific: Promotion of Enabling Policies & Regulatory Frameworks for ... & Communication Technology Development

    United Nations, 2005
    PDF
    Information Communication Technologies and Human Development: Opportunities and Challenges

    Information Communication Technologies and Human Development: Opportunities and Challenges

    Mila Gascó-Hernández, 2006
    PDF
    MIMO Transceiver Design via Majorization Theory (Foundations and Trends in Communications and Information Theory)

    MIMO Transceiver Design via Majorization Theory (Foundations and Trends in Communications and Information Theory)

    Daniel, P. Palomar, Yi Jiang, 2007
    DJVU
    Principles of Digital Communication and Coding (Communications and Information Theory)

    Principles of Digital Communication and Coding (Communications and Information Theory)

    Andrew J. Viterbi, Jim K. Omura, 1979
    PDF
    Auto-identification and ubiquitous computing applications: RFID and smart technologies for information convergence

    Auto-identification and ubiquitous computing applications: RFID and smart technologies for information convergence

    Judith Symonds, Judith Symonds, John Ayoade, Dave Parry, 2009
    PDF
    Auto-identification and Ubiquitous Computing Applications: Rfid and Smart Technologies for Information Convergence (Premier Reference Source)

    Auto-identification and Ubiquitous Computing Applications: Rfid and Smart Technologies for Information Convergence (Premier Reference Source)

    Judith Symonds, 2009
    PDF
    Control of Redundant Robot Manipulators: Theory and Experiments (Lecture Notes in Control and Information Sciences)

    Control of Redundant Robot Manipulators: Theory and Experiments (Lecture Notes in Control and Information Sciences)

    Rajni V. Patel, F. Shadpey, 2005
    PDF
    Signal Processing and Multimedia: International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Signal Processing and Multimedia: International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Seoksoo Kim (auth.), Tai-hoon Kim, Sankar K. Pal, William I. Grosky, Niki Pissinou, Timothy K. Shih, Dominik Ślęzak (eds.), 2010
    PDF
    Web-based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission

    Web-based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission

    Manjunath Ramachandra, 2009
    PDF
    Accessing and Browsing Information and Communication

    Accessing and Browsing Information and Communication

    Ronald E. Rice, Maureen McCreadie, Shan-Ju L. Chang, 2001
    PDF
    Citizens, Politics and Social Communication: Information and Influence in an Election Campaign

    Citizens, Politics and Social Communication: Information and Influence in an Election Campaign

    R. Robert Huckfeldt, John Sprague, James H. Kuklinski, Robert S. Wyer, Stanley Feldman, 1995
    PDF
    Communication and Information Theory in Watermarking A Survey

    Communication and Information Theory in Watermarking A Survey

    Adrian Sequeira and Deepa Kundur
    PDF
    Electrochemistry and Corrosion Science (Information Technology: Transmission, Processing and Storage)

    Electrochemistry and Corrosion Science (Information Technology: Transmission, Processing and Storage)

    Nestor Perez, 2004
    PDF
    Robotic Welding, Intelligence and Automation (Lecture Notes in Control and Information Sciences)

    Robotic Welding, Intelligence and Automation (Lecture Notes in Control and Information Sciences)

    Tzyh-Jong Tarn, Shan-Ben Chen, Changjiu Zhou, 2004
    PDF
    Enhancing Participation And Governance in Water Resources Management: Conventional Approaches And Information Technology

    Enhancing Participation And Governance in Water Resources Management: Conventional Approaches And Information Technology

    Libor Jansky, Juha I. Uitto, 2006
    PDF
    Brain Arousal and Information Theory: Neural and Genetic Mechanisms

    Brain Arousal and Information Theory: Neural and Genetic Mechanisms

    Donald Pfaff, 2005
    PDF
    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Ari Takanen, Jared DeMott, Charlie Miller, 2008
    PDF
    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

    Ari Takanen, Jared DeMott, Charlie Miller, 2008
    PDF
    Information and Entropy Econometrics - A Review and Synthesis

    Information and Entropy Econometrics - A Review and Synthesis

    Amos Golan, 2008
    PDF
    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings

    Taizo Shirai, Bart Preneel (auth.), Pil Joong Lee (eds.), 2004
    PDF
    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings

    Pascal Paillier, Damien Vergnaud (auth.), Bimal Roy (eds.), 2005
    DJVU
    Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

    Advances in Cryptology — ASIACRYPT '96: International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings

    Atsuko Miyaji (auth.), Kwangjo Kim, Tsutomu Matsumoto (eds.), 1996
    PDF
    Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

    Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

    Alex Biryukov, Adi Shamir (auth.), Tatsuaki Okamoto (eds.), 2000
    |< ۷۷ ۷۸ ۷۹ ۸۰ ۸۱ ۸۲ ۸۳ ۸۴ ۸۵ ۸۶ ۸۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.