ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۹ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

    Vandana P. Janeja, 2005
    PDF
    China's Security Interests in the 21st Century (Routledgecurzon Security in Asia Series)

    China's Security Interests in the 21st Century (Routledgecurzon Security in Asia Series)

    Russell Ong, 2007
    PDF
    Global Security Governance: Competing perceptions of Security in the 21st century

    Global Security Governance: Competing perceptions of Security in the 21st century

    Emil Kirchner, 2007
    PDF
    Industrial Security: Managing Security in the 21st Century

    Industrial Security: Managing Security in the 21st Century

    David L. Russell, 2015
    PDF
    Nuclear Weapons and Cooperative Security in the 21st Century: The New Disorder (Routledge Global Security Studies)

    Nuclear Weapons and Cooperative Security in the 21st Century: The New Disorder (Routledge Global Security Studies)

    Stephen J. Cimbala, 2009
    PDF
    Russia's Foreign Security Policy in the 21st Century: Putin, Medvedev and Beyond (Contemporary Security Studies)

    Russia's Foreign Security Policy in the 21st Century: Putin, Medvedev and Beyond (Contemporary Security Studies)

    Marcel De Haas, 2010
    PDF
    Global Security and the War on Terror: Elite Power and the Illusion of Control (Contemporary Security Studies)

    Global Security and the War on Terror: Elite Power and the Illusion of Control (Contemporary Security Studies)

    Paul Rogers, 2007
    PDF
    Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium

    Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium

    Hideki Sakurada, 2002
    PDF
    Solar Desalination for the 21st Century: A Review of Modern Technologies and Researches on Desalination Coupled to Renewable Energies (NATO Science for ... Security Series C: Environmental Security)

    Solar Desalination for the 21st Century: A Review of Modern Technologies and Researches on Desalination Coupled to Renewable Energies (NATO Science for ... Security Series C: Environmental Security)

    Lucio Rizzuti, 2007
    PDF
    Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings

    Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings

    Yiming Jing, 2012
    PDF
    Open Source Security Tools: Practical Guide to Security Applications

    Open Source Security Tools: Practical Guide to Security Applications

    Tony Howlett, 2004
    CHM
    Open Source Security Tools: Practical Guide to Security Applications, A

    Open Source Security Tools: Practical Guide to Security Applications, A

    Tony Howlett, 2004
    EPUB
    Open Source Security Tools: Practical Guide to Security Applications, A

    Open Source Security Tools: Practical Guide to Security Applications, A

    Tony Howlett, 2004
    PDF
    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

    Computer Security – ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

    Elli Fragkaki, 2012
    PDF
    Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings

    Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings

    Man Ho Au, 2006
    PDF
    Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings

    Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006. Proceedings

    Man Ho Au, 2006
    PDF
    Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings

    Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007. Proceedings

    Satoshi Hada, 2007
    PDF
    Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series)

    Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series)

    Neil Archibald, 2005
    EPUB
    Risk, Global Governance and Security: The Other War on Terror (Routledge Global Security Studies)

    Risk, Global Governance and Security: The Other War on Terror (Routledge Global Security Studies)

    Yee-kuang Heng, 2009
    PDF
    A Process for Developing a Common Vocabulary in the Information Security Area (Nato Science for Peace and Security)

    A Process for Developing a Common Vocabulary in the Information Security Area (Nato Science for Peace and Security)

    J. Von Knop, 2007
    PDF
    Chemicals as Intentional and Accidental Global Environmental Threats (NATO Science for Peace and Security Series C: Environmental Security)

    Chemicals as Intentional and Accidental Global Environmental Threats (NATO Science for Peace and Security Series C: Environmental Security)

    Lubomir Simeonov, 2006
    PDF
    Advances in Sensing with Security Applications (NATO Science for Peace and Security Series A: Chemistry and Biology)

    Advances in Sensing with Security Applications (NATO Science for Peace and Security Series A: Chemistry and Biology)

    Jim Byrnes, 2006
    PDF
    Bulletproof Wireless Security: GSM, UMTS, 802.11 and Ad Hoc Security

    Bulletproof Wireless Security: GSM, UMTS, 802.11 and Ad Hoc Security

    Praphul Chandra, 2005
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security

    Praphul Chandra, 2005
    PDF
    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

    Praphul Chandra, 2005
    |< ۴ ۵ ۶ ۷ ۸ ۹ ۱۰ ۱۱ ۱۲ ۱۳ ۱۴ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.