Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
national security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
3
Vaata veel..
(2/140)
Ekspordi
ekspordi kõik päringu tulemused
(3)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
2
artikkel ajalehes
Global knowledge warfare : using strategic imagination to harness uncertainty and fear
Shiraev, Eric
;
Mölder, Holger
The cipher brief
2020
"Global knowledge warfare"
artikkel ajalehes
3
artikkel kogumikus
Towards a Cyber Maastricht : two steps forward, one step back
Kasper, Agnes
;
Vernygora, Vlad Alex
The future of the European Union : demisting the debate
2020
/
p. 186-210
https://www.um.edu.mt/library/oar/handle/123456789/52310
https://www.um.edu.mt/library/oar/bitstream/123456789/52310/1/Towards_a_%e2%80%98Cyber_Maastricht%e2%80%99_two_steps_forward_one_step_back_2020.pdf
artikkel kogumikus
Kirjeid leitud 3, kuvan
1 - 3
võtmesõna
137
1.
national security
2.
national cyber security strategy
3.
international security
4.
ad-hoc sensor networks security
5.
Automatic Security Verification
6.
Blockchain security
7.
cache security
8.
communication system security
9.
comprehensive system of economic security
10.
computer security
11.
cooperative security dilemma
12.
cyber security
13.
cyber security education
14.
cyber security exercises
15.
cyber security strategies
16.
cyber-security
17.
data security
18.
development of security cameras
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
human security
30.
information security
31.
internal security
32.
investment and innovation security
33.
IPv6 security
34.
IT security
35.
IT security management
36.
job security
37.
long-term security
38.
metadata model for security measures
39.
Middle Eastern security
40.
Mobile security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security adaptation
55.
security analysis
56.
security and justice (AFSJ)
57.
security and privacy
58.
security and privacy in smart grids
59.
Security Assertion Mining
60.
security closure
61.
Security Coverage
62.
security dataset
63.
security dilemma
64.
Security evaluation
65.
security evaluation instruments
66.
security log analysis
67.
security management
68.
security model
69.
security monitoring
70.
security notion
71.
security objectives
72.
security of data
73.
security of supply
74.
security operation center
75.
security operations center
76.
security patterns
77.
security policy
78.
security problem definition
79.
security proof
80.
security protocols
81.
security requirements
82.
security requirements engineering
83.
security risk assessment
84.
security risk management
85.
security strategies
86.
security systems for military objects
87.
security testing
88.
security training
89.
security verification
90.
security-by-design
91.
social security planning
92.
societal security
93.
system of economic security
94.
system security
95.
terrorism security
96.
transmission System Security
97.
voting privacy and security
98.
binding effect of national decisions
99.
comprehensive national defense
100.
effect of national decisions on actions for competition damages
101.
Estonian National Health Information System
102.
ethnic and national identity
103.
European Federation of National Academies of Sciences and Humanities All European Academies, (ALLEA)
104.
gross national happiness
105.
national dietary survey
106.
national accounting practices
107.
National archive
108.
National building recommendation
109.
national competition authority
110.
national court
111.
national courts
112.
national culture
113.
national curricula
114.
national defense
115.
national economy
116.
national embeddedness values
117.
national emergency
118.
national energy policy
119.
national identity
120.
national innovation system
121.
national jurisdiction
122.
national legislation
123.
national maritime defence
124.
National memory
125.
national merger regulations
126.
national procedural provisions
127.
national provision prohibiting abuses of dominance
128.
national provision prohibiting anticompetitive agreements
129.
national regulation
130.
national requirements
131.
national sovereignty
132.
national spatial plan
133.
national survey
134.
Nigeria's National data protection regulation
135.
Polish-Lithuanian Commonwealth Commission for National Education (Komisja Educacji Narodowej, KEN)
136.
relationship between national law and EU law
137.
19th issue of the National Building Regulations of Iran (NBRI)
märksõna
3
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
3.
China National Petroleum Corporation
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT