Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
internal security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/115)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
journal article
2
journal article
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
journal article
Number of records 2, displaying
1 - 2
keyword
113
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal combustion engine
7.
internal combustion engines
8.
internal conditions
9.
internal control
10.
internal damping
11.
internal devaluation
12.
internal discharge
13.
internal friction
14.
internal heat gain
15.
internal insulation
16.
Internal Market and Customs Union
17.
internal mechanics
18.
internal partial discharge
19.
internal pressure
20.
Internal Rate of Return (IRR)
21.
internal representations
22.
internal Rossby radius
23.
internal seiches
24.
internal solitons
25.
internal variables
26.
internal waves
27.
internal-flow hydraulic modelling
28.
internal-fow head
29.
single and dual internal variables
30.
ad-hoc sensor networks security
31.
Blockchain security
32.
cache security
33.
communication system security
34.
comprehensive system of economic security
35.
computer security
36.
cooperative security dilemma
37.
cyber security
38.
cyber security education
39.
cyber security exercises
40.
cyber security strategies
41.
cyber-security
42.
data security
43.
development of security cameras
44.
drinking water security
45.
economic security
46.
economic security of enterprise
47.
emotional security
48.
energy security
49.
energy security indicator
50.
graded security
51.
hardware security
52.
hardware security primitive
53.
human security
54.
information security
55.
international security
56.
investment and innovation security
57.
IPv6 security
58.
IT security
59.
job security
60.
long-term security
61.
metadata model for security measures
62.
Middle Eastern security
63.
Mobile security
64.
national cyber security strategy
65.
national security
66.
NATO. Science for Peace and Security Program
67.
network security
68.
network security monitoring
69.
OSCE (Organization for Security and Co-operation in Europe)
70.
passenger’s security
71.
policy-based routing security
72.
political and security cultures
73.
post-quantum security
74.
power system security
75.
quantitative security
76.
regional security
77.
security
78.
security and privacy
79.
security and privacy in smart grids
80.
security closure
81.
Security Coverage
82.
security dataset
83.
security dilemma
84.
Security evaluation
85.
security log analysis
86.
security management
87.
security model
88.
security monitoring
89.
security notion
90.
security objectives
91.
security of data
92.
security of supply
93.
security operation center
94.
security patterns
95.
security problem definition
96.
security proof
97.
security protocols
98.
security requirements
99.
security requirements engineering
100.
security risk assessment
101.
security risk management
102.
security strategies
103.
security systems for military objects
104.
security testing
105.
security training
106.
security verification
107.
social security planning
108.
societal security
109.
system of economic security
110.
system security
111.
terrorism security
112.
transmission System Security
113.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT