ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security، صفحه ۹۷ از ۳۱۴ در بین ۷,۸۴۴ کتاب.
    PDF
    Israel's National Security: Issues and Challenges Since the Yom Kippur War

    Israel's National Security: Issues and Challenges Since the Yom Kippur War

    Efraim Inbar, 2008
    PDF
    Regional Security Regimes: Israel and Its Neighbors

    Regional Security Regimes: Israel and Its Neighbors

    Efraim Inbar, 1995
    PDF
    Applications of Data Mining in Computer Security

    Applications of Data Mining in Computer Security

    Steven Noel, 2002
    PDF
    Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings

    Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings

    Sabrina De Capitani di Vimercati, 2013
    RAR
    Damodaran on Valuation: Security Analysis for Investment and Corporate Finance

    Damodaran on Valuation: Security Analysis for Investment and Corporate Finance

    Aswath Damodaran, 1994
    PDF
    Damodaran on valuation: security analysis for investment and corporate finance

    Damodaran on valuation: security analysis for investment and corporate finance

    Aswath Damodaran, 1994
    PDF
    Damodaran on Valuation: Security Analysis for Investment and Corporate Finance

    Damodaran on Valuation: Security Analysis for Investment and Corporate Finance

    Aswath Damodaran, 2006
    PDF
    Computational Intelligence in Security for Information Systems: 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings

    Computational Intelligence in Security for Information Systems: 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings

    Carlos Laorden, 2011
    PDF
    Computational Intelligence in Security for Information Systems: 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings

    Computational Intelligence in Security for Information Systems: 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings

    Carlos Laorden, 2011
    PDF
    Information Technology Convergence: Security, Robotics, Automations and Communication

    Information Technology Convergence: Security, Robotics, Automations and Communication

    Shih-Chang Huang, 2013
    PDF
    Information Technology Convergence: Security, Robotics, Automations and Communication

    Information Technology Convergence: Security, Robotics, Automations and Communication

    Shih-Chang Huang, 2013
    PDF
    Vision and Displays for Military and Security Applications: The Advanced Deployable Day/Night Simulation Project

    Vision and Displays for Military and Security Applications: The Advanced Deployable Day/Night Simulation Project

    Mary K. Kaiser (auth.), 2010
    PDF
    Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers

    Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers

    TJ O"Connor, 2013
    EPUB
    Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers

    Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers

    O"Connor, 2013
    PDF
    Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    TJ O"Connor, 2012
    PDF
    Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    TJ O"Connor, 2012
    EPUB
    Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    TJ O"Connor, 2012
    PDF
    A Challenge to Social Security. The Changing Roles of Women and Men in American Society

    A Challenge to Social Security. The Changing Roles of Women and Men in American Society

    Richard V. Burkhauser, 1982
    PDF
    Behind the Gates: Life, Security, and the Pursuit of Happiness in Fortress America

    Behind the Gates: Life, Security, and the Pursuit of Happiness in Fortress America

    Setha Low, 2003
    PDF
    Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    Jean Luc Danger, 2014
    PDF
    Ending the Cold War: Interpretations, Causation, and the Study of International Relations (New Visions in Security)

    Ending the Cold War: Interpretations, Causation, and the Study of International Relations (New Visions in Security)

    Richard K. Herrmann, 2004
    PDF
    Theory and Evidence in Comparative Politics and International Relations (New Visions in Security)

    Theory and Evidence in Comparative Politics and International Relations (New Visions in Security)

    Richard Ned Lebow, 2007
    PDF
    Advances in Human-Computer Interaction: Human Comfort and Security

    Advances in Human-Computer Interaction: Human Comfort and Security

    K. C. Varghese (auth.), 1995
    PDF
    Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

    Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

    Gunter Schafer(auth.), 2004
    PDF
    Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

    Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

    Günter Schäfer, 2004
    |< ۹۲ ۹۳ ۹۴ ۹۵ ۹۶ ۹۷ ۹۸ ۹۹ ۱۰۰ ۱۰۱ ۱۰۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.