ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۸۷ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Trust, Reputation, and Security: Theories and Practice: AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002. Selected and Invited Papers

    Trust, Reputation, and Security: Theories and Practice: AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002. Selected and Invited Papers

    Michael Bacharach (auth.), 2003
    PDF
    Britain and the Middle East in the 1930s: Security Problems, 1935–39

    Britain and the Middle East in the 1930s: Security Problems, 1935–39

    Michael J. Cohen, 1992
    PDF
    ISO/IEC 27006 - Information technology, security techniques, requirements for bodies providing audit and certification of information sercurity management systems

    ISO/IEC 27006 - Information technology, security techniques, requirements for bodies providing audit and certification of information sercurity management systems

    ISO, 2007
    PDF
    Psychological Responses to the New Terrorism: A NATO-Russia Dialogue (Nato Security Through Science Series E: Human Societal Dynamics)

    Psychological Responses to the New Terrorism: A NATO-Russia Dialogue (Nato Security Through Science Series E: Human Societal Dynamics)

    S. Wessel, 2005
    PDF
    Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

    Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

    Robert H. Deng, 2008
    PDF
    Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

    Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

    Robert H. Deng, 2008
    PDF
    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Mihir Bellare (auth.), 1999
    PDF
    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Lectures on Data Security: Modern Cryptology in Theory and Practice

    Mihir Bellare (auth.), 1999
    PDF
    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Davrondzhon Gafurov, 2010
    PDF
    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

    Davrondzhon Gafurov, 2010
    PDF
    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Hsiang-Cheh Huang, 2009
    PDF
    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings

    Hsiang-Cheh Huang, 2009
    PDF
    Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

    Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

    Brian Contos, 2007
    PDF
    Security Log Management : Identifying Patterns in the Chaos

    Security Log Management : Identifying Patterns in the Chaos

    Jacob Babbin Dave Kleiman Everett F. Carter Jr. Jeremy Faircloth Mark Burnett Esteban Gutierrez, 2006
    PDF
    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Thomas Raffetseder, 2007
    PDF
    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Information Security: 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings

    Thomas Raffetseder, 2007
    PDF
    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Shai Halevi (auth.), 2008
    PDF
    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

    Shai Halevi (auth.), 2008
    PDF
    The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition

    The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, First Edition

    Gerald L. Kovacich, 2003
    PDF
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    Chris Anley, 2007
    PDF
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    Chris Anley, 2007
    PDF
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

    Chris Anley, 2007
    PDF
    Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

    Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers

    Jan Vossaert, 2010
    PDF
    Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers

    Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers

    Peter Teufl, 2012
    PDF
    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

    Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

    Andreas Pfitzmann (auth.), 2008
    |< ۸۲ ۸۳ ۸۴ ۸۵ ۸۶ ۸۷ ۸۸ ۸۹ ۹۰ ۹۱ ۹۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.