ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۹۲ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    CHM
    Information Technology Security: Advice from Experts

    Information Technology Security: Advice from Experts

    Lawrence Oliva, 2004
    PDF
    Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

    Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

    Joseph Bonneau, 2012
    PDF
    Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers

    Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers

    Bruce Christianson (auth.), 2013
    PDF
    Natural Resources and Social Conflict: Towards Critical Environmental Security

    Natural Resources and Social Conflict: Towards Critical Environmental Security

    Matthew A. Schnurr, 2012
    PDF
    Natural Resources and Social Conflict: Towards Critical Environmental Security

    Natural Resources and Social Conflict: Towards Critical Environmental Security

    Matthew A. Schnurr, 2012
    PDF
    Permafrost Response on Economic Development, Environmental Security and Natural Resources

    Permafrost Response on Economic Development, Environmental Security and Natural Resources

    Roland Paepe (auth.), 2001
    PDF
    Canadian-Caribbean Relations in Transition: Trade, Sustainable Development and Security

    Canadian-Caribbean Relations in Transition: Trade, Sustainable Development and Security

    Jerry Haar, 1999
    PDF
    Communication Technologies, Information Security and Sustainable Development: Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers

    Communication Technologies, Information Security and Sustainable Development: Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers

    Faisal Karim Shaikh, 2014
    PDF
    Environmental protection, security and armed conflict: A sustainable development perspective

    Environmental protection, security and armed conflict: A sustainable development perspective

    Onita Das, 2013
    PDF
    Security and Sustainable Development in Myanmar (Routledge Contemporary Southeast Asia Series)

    Security and Sustainable Development in Myanmar (Routledge Contemporary Southeast Asia Series)

    Helen James, 2006
    PDF
    South Asia in the World: Problem-Solving Perspectives on Security, Sustainable Development, and Good Governance (Population Studies)

    South Asia in the World: Problem-Solving Perspectives on Security, Sustainable Development, and Good Governance (Population Studies)

    Ramesh Thakur
    PDF
    Sustainable development and human security in Africa : governance as the missing link

    Sustainable development and human security in Africa : governance as the missing link

    Picard, 2015
    PDF
    Water Security, Climate Change and Sustainable Development

    Water Security, Climate Change and Sustainable Development

    Asit K. Biswas, 2016
    PDF
    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

    Richard A. Kemmerer (auth.), 2009
    PDF
    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

    Richard A. Kemmerer (auth.), 2009
    PDF
    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

    Richard A. Kemmerer (auth.), 2009
    PDF
    Information and Communications Security: 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings

    Information and Communications Security: 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings

    Bart Preneel (auth.), 2010
    PDF
    Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

    Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

    Joseph K. Liu, 2011
    PDF
    Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

    Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

    Joseph K. Liu, 2011
    PDF
    Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

    Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

    Joseph K. Liu, 2011
    PDF
    Information and Communications Security: 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings

    Information and Communications Security: 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings

    Chee Meng Tey, 2013
    PDF
    Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003. Proceedings

    Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003. Proceedings

    Wang Feng, 2003
    PDF
    Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

    Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

    Charalampos Papamanthou, 2007
    PDF
    Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

    Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

    Charalampos Papamanthou, 2007
    PDF
    Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

    Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

    Charalampos Papamanthou, 2007
    |< ۸۷ ۸۸ ۸۹ ۹۰ ۹۱ ۹۲ ۹۳ ۹۴ ۹۵ ۹۶ ۹۷ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.