ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Cambridge University Press And The Open University، صفحه ۹۹۴ از ۱۸,۶۰۷ در بین ۴۶۵,۱۵۲ کتاب.
    PDF
    Boundary Elements and Other Mesh Reduction Methods XXX (Wit Transactions on Modelling and Simulation)

    Boundary Elements and Other Mesh Reduction Methods XXX (Wit Transactions on Modelling and Simulation)

    C. A. Brebbia, L. Skerget, 2008
    PDF
    Boundary Elements and Other Mesh Reduction Methods XXXII (Wit Transactions on Modelling and Simulation)

    Boundary Elements and Other Mesh Reduction Methods XXXII (Wit Transactions on Modelling and Simulation)

    C. A. (editor) Brebbia, 2010
    PDF
    Boundary Elements and Other Mesh Reduction Methods XXXIII (Wit Transactions on Modelling and Simulation)

    Boundary Elements and Other Mesh Reduction Methods XXXIII (Wit Transactions on Modelling and Simulation)

    C. A. Brebbia, V. Popov, 2011
    PDF
    WiFi, WiMAX and LTE Multi-hop Mesh Networks: Basic Communication Protocols and Application Areas

    WiFi, WiMAX and LTE Multi-hop Mesh Networks: Basic Communication Protocols and Application Areas

    Hung-Yu Wei, Jarogniew Rykowski, Sudhir Dixit, 2013
    PDF
    WiFi, WiMAX, and LTE Multi-Hop Mesh Networks: Basic Communication Protocols and Application Areas

    WiFi, WiMAX, and LTE Multi-Hop Mesh Networks: Basic Communication Protocols and Application Areas

    Hung?Yu Wei, Jarogniew Rykowski, Sudhir Dixit(auth.), 2013
    PDF
    Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)

    Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)

    Yan Zhang, Jijun Luo, Honglin Hu, 2006
    PDF
    Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)

    Wireless Mesh Networking: Architectures, Protocols and Standards (Wireless Networks and Mobile Communications)

    Yan Zhang, Jijun Luo, Honglin Hu, 2006
    PDF
    Art and Archaeology of Afghanistan: Its Fall and Survival: a Multi-disciplinary Approach (Handbook of Oriental Studies. Section 8 Uralic & Central Asian Studies)

    Art and Archaeology of Afghanistan: Its Fall and Survival: a Multi-disciplinary Approach (Handbook of Oriental Studies. Section 8 Uralic & Central Asian Studies)

    Juliette Van Krieken-Pieters, 2006
    PDF
    Group Theoretical Methods in Physics: Seventh International Colloquium and Integrative Conference on Group Theory and Mathematical Physics, Held in Austin, Texas, September 11–16, 1978

    Group Theoretical Methods in Physics: Seventh International Colloquium and Integrative Conference on Group Theory and Mathematical Physics, Held in Austin, Texas, September 11–16, 1978

    Wolf Beiglböck, Arno Böhm, E. Takasugi (eds.), 1979
    PDF
    Contamination Control and Cleanrooms: Problems, Engineering Solutions, and Applications

    Contamination Control and Cleanrooms: Problems, Engineering Solutions, and Applications

    Alvin Lieberman (auth.), 1992
    PDF
    ISO 14644-4:2001, Cleanrooms and associated controlled environments -- Part 4: Design, construction and start-up

    ISO 14644-4:2001, Cleanrooms and associated controlled environments -- Part 4: Design, construction and start-up

    ISO TC 209/WG 4, 2007
    PDF
    Exiles on Main Street: Jewish American Writers and American Literary Culture (Jewish Literature and Culture)

    Exiles on Main Street: Jewish American Writers and American Literary Culture (Jewish Literature and Culture)

    Julian Levinson, 2008
    PDF
    Fiction and the Law: Legal Discourse in Victorian and Modernist Literature

    Fiction and the Law: Legal Discourse in Victorian and Modernist Literature

    Kieran Dolin, 1999
    PDF
    Finding a Replacement for the Soul: Mind and Meaning in Literature and Philosophy

    Finding a Replacement for the Soul: Mind and Meaning in Literature and Philosophy

    Brett Bourbon, 2004
    PDF
    Flaubert and the Gift of Speech: Dialogue and Discourse in Four "Modern" Novels

    Flaubert and the Gift of Speech: Dialogue and Discourse in Four "Modern" Novels

    Stirling Haig, 1986
    PDF
    Start and Run a Sandwich and Coffee Shop (Small Business Start Ups)

    Start and Run a Sandwich and Coffee Shop (Small Business Start Ups)

    Jill Sutherland
    PDF
    Starting and Running a Coaching Business: The complete guide to setting up and managing a coaching practice (Small Business Start-Ups)

    Starting and Running a Coaching Business: The complete guide to setting up and managing a coaching practice (Small Business Start-Ups)

    Aryanne Oade, 2009
    PDF
    Corporate hacking and technology-driven crime: social dynamics and implications

    Corporate hacking and technology-driven crime: social dynamics and implications

    Thomas J. Holt, Bernadette H. Schell, 2010
    PDF
    Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

    Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

    EC-Council, 2009
    PDF
    Ethical Hacking and Countermeasures: Threats and Defense Mechanisms

    Ethical Hacking and Countermeasures: Threats and Defense Mechanisms

    EC-Council, 2009
    MOBI
    Financial Hacking:Evaluate Risks, Price Derivatives, Structure Trades, and Build Your Intuition Quickly and Easily

    Financial Hacking:Evaluate Risks, Price Derivatives, Structure Trades, and Build Your Intuition Quickly and Easily

    Philip Maymin, 2012
    PDF
    Learning from the South Korean Developmental Success: Effective Developmental Cooperation and Synergistic Institutions and Policies

    Learning from the South Korean Developmental Success: Effective Developmental Cooperation and Synergistic Institutions and Policies

    Ilcheong Yi, Thandika Mkandawire (eds.), 2014
    EPUB
    Technology and Productivity: The Korean Way of Learning and Catching Up

    Technology and Productivity: The Korean Way of Learning and Catching Up

    Youngil Lim, 1999
    PDF
    Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    Jonathan Zdziarski, 2012
    EPUB
    Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

    Jonathan Zdziarski, 2012
    |< ۹۸۹ ۹۹۰ ۹۹۱ ۹۹۲ ۹۹۳ ۹۹۴ ۹۹۵ ۹۹۶ ۹۹۷ ۹۹۸ ۹۹۹ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۵, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.