ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۹۰ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Computational intelligence in information assurance and security

    Computational intelligence in information assurance and security

    Ajith Abraham, 2007
    PDF
    Homeland Security. The Essentials

    Homeland Security. The Essentials

    Jane Bullock, George Haddow, 2012
    PDF
    Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security)

    Introduction to Emergency Management, Second Edition (Butterworth-Heinemann Homeland Security)

    George Haddow, 2005
    PDF
    Introduction to Emergency Management, Third Edition (Homeland Security Series)

    Introduction to Emergency Management, Third Edition (Homeland Security Series)

    George Haddow, 2007
    PDF
    Applications and Techniques in Information Security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

    Applications and Techniques in Information Security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

    Wenjia Niu, 2015
    PDF
    Crime and Corruption in New Democracies: The Politics of (In)Security

    Crime and Corruption in New Democracies: The Politics of (In)Security

    Jon Moran (auth.), 2011
    PDF
    Crime At Work: Studies in Security and Crime Prevention Volume I

    Crime At Work: Studies in Security and Crime Prevention Volume I

    Martin Gill (eds.), 2005
    PDF
    Network and System Security: 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings

    Network and System Security: 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings

    Man Ho Au, 2014
    PDF
    Advances in Air Pollution Modeling for Environmental Security : Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution ... Series: IV: Earth and Environmental Sciences)

    Advances in Air Pollution Modeling for Environmental Security : Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution ... Series: IV: Earth and Environmental Sciences)

    István Faragó, 2005
    PDF
    Iran's Security Policy in the Post-Revolutionary Era

    Iran's Security Policy in the Post-Revolutionary Era

    Daniel L. Byman, 2001
    PDF
    Iran's Security Policy in the Post-Revolutionary Era

    Iran's Security Policy in the Post-Revolutionary Era

    Daniel L. Byman, 2001
    PDF
    The future security environment in the Middle East: conflict, stability, and political change, Issue 1640

    The future security environment in the Middle East: conflict, stability, and political change, Issue 1640

    Nora Bensahel, 2004
    PDF
    Adaptive Security Management Architecture

    Adaptive Security Management Architecture

    James S. Tiller, 2010
    PDF
    Security Versus Freedom?: A Challenge for Europe's Future

    Security Versus Freedom?: A Challenge for Europe's Future

    Thierry Balzacq, 2006
    PDF
    Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

    Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

    Kelley Dempsey, 2011
    PDF
    Stabilization, Safety, and Security of Distributed Systems: 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings

    Stabilization, Safety, and Security of Distributed Systems: 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings

    Andrzej Pelc, 2015
    PDF
    Terrorism Informatics:  Knowledge Management and Data Mining for Homeland Security

    Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security

    Edna Reid, 2008
    PDF
    Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (Integrated Series in Information Systems)

    Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (Integrated Series in Information Systems)

    Hsinchun Chen, 2008
    PDF
    Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

    Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings

    Jan-Min Chen (auth.), 2013
    PDF
    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Serge Vaudenay (auth.), 2005
    PDF
    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

    Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

    Dan Boneh (auth.), 2012
    PDF
    Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings

    Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings

    Xavier Boyen (auth.), 2011
    PDF
    Public Key Cryptography - PKC 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, ... Computer Science / Security and Cryptology)

    Public Key Cryptography - PKC 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, ... Computer Science / Security and Cryptology)

    Tatsuaki Okamoto, 2007
    PDF
    ISSE 2008 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference

    ISSE 2008 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference

    Lenka Fibikova, 2009
    EPUB
    Unmasking the Social Engineer: The Human Element of Security

    Unmasking the Social Engineer: The Human Element of Security

    Christopher Hadnagy, 2014
    |< ۸۵ ۸۶ ۸۷ ۸۸ ۸۹ ۹۰ ۹۱ ۹۲ ۹۳ ۹۴ ۹۵ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.