Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Middle Eastern security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/120)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Cultural crossroads in the Middle East : the historical, cultural and political legacy of intercultural dialogue and conflict from the ancient Near East to the present day [Online resource]
2019
https://www.ester.ee/record=b5259885*est
https://library.oapen.org/bitstream/id/3b0f3d72-300f-435a-a6d7-b5aad2db3fb5/978-9949-03-176-4.pdf
book
Number of records 1, displaying
1 - 1
keyword
116
1.
Middle Eastern security
2.
Middle Eastern history
3.
Middle Eastern religions
4.
Asia including Middle East
5.
conflict in Middle East
6.
cultural legacy in Middle East
7.
Early and Middle Ordovician
8.
late Iron Age, middle
9.
Middle and Upper Pleistocene
10.
middle corridor
11.
Middle Devonian
12.
Middle East
13.
middle molecule uremic toxins
14.
Middle molecules
15.
Middle Neo-Pleistocene
16.
Middle Ordovician
17.
middle Pleistocene
18.
middle schools
19.
Middle-Late Ordovician
20.
middle-range theory
21.
nation-building in Middle East
22.
ad-hoc sensor networks security
23.
Blockchain security
24.
cache security
25.
Central and Eastern Europe
26.
Central and Eastern European countries (CEECs)
27.
Central and Eastern European finance
28.
Central and Eastern European stock markets
29.
communication system security
30.
comprehensive system of economic security
31.
computer security
32.
cooperative security dilemma
33.
cyber security
34.
cyber security education
35.
cyber security exercises
36.
cyber security strategies
37.
cyber-security
38.
data security
39.
development of security cameras
40.
drinking water security
41.
eastern Baltic Sea
42.
Eastern Europe
43.
Eastern Gulf of Finland
44.
Eastern Partnership
45.
eastern Yunnan
46.
economic security
47.
economic security of enterprise
48.
emotional security
49.
energy security
50.
energy security indicator
51.
EU Eastern cooperation
52.
Finance and economics in Central and Eastern Europe
53.
graded security
54.
hardware security
55.
hardware security primitive
56.
human security
57.
information security
58.
internal security
59.
international security
60.
investment and innovation security
61.
IPv6 security
62.
IT security
63.
job security
64.
long-term security
65.
metadata model for security measures
66.
Mobile security
67.
national cyber security strategy
68.
national security
69.
NATO. Science for Peace and Security Program
70.
network security
71.
network security monitoring
72.
OSCE (Organization for Security and Co-operation in Europe)
73.
passenger’s security
74.
policy-based routing security
75.
political and security cultures
76.
post-quantum security
77.
power system security
78.
quantitative security
79.
regional security
80.
security
81.
security and privacy
82.
security and privacy in smart grids
83.
security closure
84.
Security Coverage
85.
security dataset
86.
security dilemma
87.
Security evaluation
88.
security log analysis
89.
security management
90.
security model
91.
security monitoring
92.
security notion
93.
security objectives
94.
security of data
95.
security of supply
96.
security operation center
97.
security patterns
98.
security problem definition
99.
security proof
100.
security protocols
101.
security requirements
102.
security requirements engineering
103.
security risk assessment
104.
security risk management
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
social security planning
111.
societal security
112.
system of economic security
113.
system security
114.
terrorism security
115.
transmission System Security
116.
voting privacy and security
subject term
4
1.
CEEA (Central and Eastern Euro Area)
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
Network of Institutes and Schools of Public Administration in Central and Eastern Europe (NISPAcee)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT