ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Stanford Security Studies، صفحه ۸۳ از ۱,۰۲۱ در بین ۲۵,۵۰۱ کتاب.
    PDF
    Your Government Failed You: Breaking the Cycle of National Security Disasters

    Your Government Failed You: Breaking the Cycle of National Security Disasters

    Richard A. Clarke, 2008
    PDF
    Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

    Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

    John Hoopes, 2008
    PDF
    Virtualization Security: Business Continuity (EC-Council Disaster Recovery Professional (Edrp))

    Virtualization Security: Business Continuity (EC-Council Disaster Recovery Professional (Edrp))

    EC-Council, 2010
    PDF
    The Everyday Resilience of the City: How Cities Respond to Terrorism and Disaster (New Security Challenges)

    The Everyday Resilience of the City: How Cities Respond to Terrorism and Disaster (New Security Challenges)

    Jon Coaffee, David Murakami Wood, Peter Rogers, 2008
    PDF
    Hadoop Security: Protecting Your Big Data Platform

    Hadoop Security: Protecting Your Big Data Platform

    Ben Spivey, Joey Echeverria, 2015
    EPUB
    Hadoop Security: Protecting Your Big Data Platform

    Hadoop Security: Protecting Your Big Data Platform

    Ben Spivey, Joey Echeverria, 2015
    MOBI
    Hadoop Security: Protecting Your Big Data Platform

    Hadoop Security: Protecting Your Big Data Platform

    Ben Spivey, Joey Echeverria, 2015
    PDF
    Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)

    Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)

    Amy Wenxuan Ding, 2009
    PDF
    Optimisation of Disaster Forecasting and Prevention Measures in the Context of Human and Social Dynamics - Volume 52 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    Optimisation of Disaster Forecasting and Prevention Measures in the Context of Human and Social Dynamics - Volume 52 NATO Science for Peace and Security Series - E: Human and Societal Dynamics

    I. Apostol, D.L. Barry, W.G. Coldewey and D. Reimer, 2009
    PDF
    Human Security and Natural Disasters

    Human Security and Natural Disasters

    Christopher Hobson, Paul Bacon, Robin Cameron, 2014
    PDF
    Food Security and Risk Reduction in Bangladesh

    Food Security and Risk Reduction in Bangladesh

    Umma Habiba, Abu Wali Raghib Hassan, Md. Anwarul Abedin, Rajib Shaw (eds.), 2015
    PDF
    Food Security and Risk Reduction in Bangladesh

    Food Security and Risk Reduction in Bangladesh

    Umma Habiba, Md. Anwarul Abedin, Abu Wali Raghib Hassan, Rajib Shaw, 2015
    PDF
    European Civil Security Governance: Diversity and Cooperation in Crisis and Disaster Management

    European Civil Security Governance: Diversity and Cooperation in Crisis and Disaster Management

    Raphael Bossong, Hendrik Hegemann (eds.), 2015
    PDF
    Disaster Response and Homeland Security: What Works, What Doesn't

    Disaster Response and Homeland Security: What Works, What Doesn't

    James F. Miskel, 2006
    PDF
    Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings

    Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings

    Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (auth.), Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (eds.), 2012
    PDF
    Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings

    Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings

    Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko, Lei Shu (eds.), 2014
    PDF
    Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings

    Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings

    Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.), 2013
    PDF
    Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

    Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

    Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (eds.), 2014
    PDF
    Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

    Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

    Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.), 2015
    PDF
    Security in an IPv6 Environment

    Security in an IPv6 Environment

    Daniel Minoli, Jake Kouns, 2008
    CHM
    TCP IP Architecture Protocols and Implementation With IPv6 and IP Security--McGraw Hill Series On Computer Communications

    TCP IP Architecture Protocols and Implementation With IPv6 and IP Security--McGraw Hill Series On Computer Communications

    Sidnie Feit, 1998
    CHM
    TCP IP: Architecture, Protocols and Implementation with IPv6 and IP Security

    TCP IP: Architecture, Protocols and Implementation with IPv6 and IP Security

    Sidnie Feit, 1998
    PDF
    Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy

    Terrorism, Security and Nationality: An Introductory Study in Applied Political Philosophy

    Paul Gilbert, 1994
    PDF
    The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness

    The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness

    Scott Watson, 2007
    PDF
    Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems

    Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems

    Eric Knapp, 2011
    |< ۷۸ ۷۹ ۸۰ ۸۱ ۸۲ ۸۳ ۸۴ ۸۵ ۸۶ ۸۷ ۸۸ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.