ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

نتایج جستجو

برای Security Knowledge، صفحه ۱ از ۵۳۹ در بین ۱۳,۴۶۶ کتاب.
    PDF
    Rethinking Knowledge Management: From Knowledge Artifacts to Knowledge Processes (Information Science and Knowledge Management)

    Rethinking Knowledge Management: From Knowledge Artifacts to Knowledge Processes (Information Science and Knowledge Management)

    Claire R. McInerney (Editor), 2007
    EPUB
    CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

    CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

    Glen D. Singh, Michael Vinod, Vijay Anandh, 2018
    PDF
    Emerging Threats to Energy Security and Stability: Proceedings of the NATO Advanced Research Workshop on Emerging Threats to Energy Security and Stability, ... Security Series C: Environmental Security)

    Emerging Threats to Energy Security and Stability: Proceedings of the NATO Advanced Research Workshop on Emerging Threats to Energy Security and Stability, ... Security Series C: Environmental Security)

    Hugo McPherson, W.Duncan Wood, Derek M. Robinson, 2005
    PDF
    Setting the 21st Century Security Agenda: Proceedings of the 5th International Security Forum (Studies in Contemporary History and Security Policy)

    Setting the 21st Century Security Agenda: Proceedings of the 5th International Security Forum (Studies in Contemporary History and Security Policy)

    Switzerland) International Security Forum 2002 Zurich, 2003
    PDF
    Mini-Micro Fuel Cells: Fundamentals and Applications (NATO Science for Peace and Security Series C: Environmental Security) (NATO Science for Peace and Security Series C: Environmental Security)

    Mini-Micro Fuel Cells: Fundamentals and Applications (NATO Science for Peace and Security Series C: Environmental Security) (NATO Science for Peace and Security Series C: Environmental Security)

    S. Kakaç, 2008
    PDF
    Advances in Sensing with Security Applications (NATO Security through Science Series   NATO Security through Science Series A: Chemistry and Biology) (NATO ... Security Series A: Chemistry and Biology)

    Advances in Sensing with Security Applications (NATO Security through Science Series NATO Security through Science Series A: Chemistry and Biology) (NATO ... Security Series A: Chemistry and Biology)

    Jim Byrnes, 2006
    PDF
    Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands

    Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands

    Rüdiger Weis (auth.), 1999
    PDF
    Quantum Communication and Security (NATO Science for Peace and Security Series: Information and Communication Security) (NATO Security Through Science Series. D: Information and Com)

    Quantum Communication and Security (NATO Science for Peace and Security Series: Information and Communication Security) (NATO Security Through Science Series. D: Information and Com)

    S. Kilin, 2007
    PDF
    Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ... Computer Science   Security and Cryptology)

    Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ... Computer Science Security and Cryptology)

    Pierpaolo Degano, 2009
    PDF
    Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)

    Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)

    R. Giladi D.N. Serpanos, 2006
    PDF
    Verification of Infinite-State Systems with Applications to Security: Volume 1 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)

    Verification of Infinite-State Systems with Applications to Security: Volume 1 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)

    M. Minea, 2006
    PDF
    Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

    Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

    Madhu Akula, Akash Mahajan, 2017
    PDF
    Securing Enterprise Securing Enterprise Securing Enterprise Web Applications at Web Applications at Web Applications at Web Applications at the Source: An the Source: An the Source: An the Source: An Application Security Application Security Application Security Application Security Perspective

    Securing Enterprise Securing Enterprise Securing Enterprise Web Applications at Web Applications at Web Applications at Web Applications at the Source: An the Source: An the Source: An the Source: An Application Security Application Security Application Security Application Security Perspective

    Eugene Lebanidze, 2020
    PDF
    Software Engineering of Fault Tolerant Systems (Software Engineering and Knowledge Engineering) (Software Engineering and Knowledge Engineering) (Series ... Engineering and Knowledge Engineering)

    Software Engineering of Fault Tolerant Systems (Software Engineering and Knowledge Engineering) (Software Engineering and Knowledge Engineering) (Series ... Engineering and Knowledge Engineering)

    P. Pelliccione, N. Guelfi, H. Muccini, A. Romanovsky, 2007
    PDF
    Creating Collaborative Advantage Through Knowledge and Innovation (Series on Innovation and Knowledge Management) (Series on Innovation and Knowledge Management)

    Creating Collaborative Advantage Through Knowledge and Innovation (Series on Innovation and Knowledge Management) (Series on Innovation and Knowledge Management)

    Suliman Hawamdeh, 2007
    PDF
    Rethinking Knowledge Management: From Knowledge Objects to Knowledge Processes

    Rethinking Knowledge Management: From Knowledge Objects to Knowledge Processes

    Mark Aakhus (auth.), 2007
    PDF
    Knowledge management Measuring Knowledge Management in the Business Sector: First Steps (Knowledge Management)

    Knowledge management Measuring Knowledge Management in the Business Sector: First Steps (Knowledge Management)

    OECD. Published by : OECD Publishing, 2004
    PDF
    Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

    Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

    Maria A. Perifanou (auth.), 2009
    PDF
    Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

    Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All: Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings

    Maria A. Perifanou (auth.), 2009
    PDF
    Knowledge : its creation, distribution, and economic significance. Volume 1, Knowledge and knowledge production

    Knowledge : its creation, distribution, and economic significance. Volume 1, Knowledge and knowledge production

    Machlup, 1980
    PDF
    Knowledge Discovery, Knowledge Engineering and Knowledge Management: 6th International Joint Conference, IC3K 2014, Rome, Italy, October 21-24, 2014, Revised Selected Papers

    Knowledge Discovery, Knowledge Engineering and Knowledge Management: 6th International Joint Conference, IC3K 2014, Rome, Italy, October 21-24, 2014, Revised Selected Papers

    Ana Fred, 2015
    PDF
    The two-fold knowledge: readings on the knowledge of self & the knowledge of God

    The two-fold knowledge: readings on the knowledge of self & the knowledge of God

    Bernard, 2004
    PDF
    World Yearbook of Education 2007: Educating the Global Workforce: Knowledge, Knowledge Work and Knowledge Workers (World Yearbook of Education)

    World Yearbook of Education 2007: Educating the Global Workforce: Knowledge, Knowledge Work and Knowledge Workers (World Yearbook of Education)

    Farrell Fenwick, 2007
    PDF
    Knowledge-Based Software Engineering: Proceedings of the Fifth Joint Conference on Knowledge-Based Software Engineering

    Knowledge-Based Software Engineering: Proceedings of the Fifth Joint Conference on Knowledge-Based Software Engineering

    Joint Conference on Knowledge-Based Software Engineering 2002 malibor, 2002
    PDF
    From Knowledge Intensive CAD to Knowledge Intensive Engineering: IFIP TC5 WG5.2. Fourth Workshop on Knowledge Intensive CAD May 22–24, 2000, Parma, Italy

    From Knowledge Intensive CAD to Knowledge Intensive Engineering: IFIP TC5 WG5.2. Fourth Workshop on Knowledge Intensive CAD May 22–24, 2000, Parma, Italy

    Sergei Ikovenko (auth.), 2002
    ۱ ۲ ۳ ۴ ۵ ۶ >|

    مقالات ISI مرتبط

    Double spending fast payments in bitcoin
    Ghassan O. Karame, Elli Androulaki, Srdjan Capku
    Fast Data Retrieval and Enhanced Data Security of Cloud Storage in Luby Transform
    Ashutosh Mishra, Velayutham T.M., C.R.S. Kuma
    Secure Storage and Fuzzy Query over Encrypted Databases
    Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yua
    Comparison of biometric and non biometric security techniques in mobile cloud computing
    A modified algorithm to improve security and performance of AODV protocol against black hole attack
    Sina Shahabi, Mahdieh Ghazvini, Mehdi Bakhtiaria

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.