Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
economic security of enterprise (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/258)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Origin and definition of the category of economic security of enterprise [Online resource]
Ianioglo, Alina
;
Põlajeva, Tatjana
9th International Scientific Conference "Business and Management 2016" : May 12-13, 2016, Vilnius, Lithuania
2016
/
p. 1-8 : ill
http://dx.doi.org/10.3846/bm.2016.46
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
256
1.
economic security of enterprise
2.
comprehensive system of economic security
3.
economic security
4.
system of economic security
5.
cross-enterprise
6.
enterprise
7.
enterprise analysis model (EAM)
8.
enterprise application integration
9.
enterprise architect (EA)
10.
enterprise architecture
11.
enterprise architecture management
12.
enterprise architecture modeling
13.
enterprise data analysis
14.
enterprise groupings
15.
enterprise information systems
16.
enterprise integration
17.
enterprise interoperability
18.
enterprise modeling
19.
Enterprise Resource Management (ERP)
20.
enterprise resource planning
21.
enterprise risk management
22.
enterprise service bus
23.
enterprise strategies
24.
enterprise strategy
25.
extended enterprise
26.
family enterprise
27.
fractal enterprise modeling
28.
inter-enterprise collaboration
29.
micro-enterprise
30.
process modeling and information systems within the extended enterprise
31.
small and medium-sized enterprise
32.
small and medium-sized enterprise (sme)
33.
social enterprise
34.
virtual enterprise
35.
virtual enterprise (VE)
36.
ad-hoc sensor networks security
37.
Automatic Security Verification
38.
Blockchain security
39.
cache security
40.
cloud security
41.
communication system security
42.
computer security
43.
cooperative security dilemma
44.
cyber security
45.
cyber security education
46.
cyber security exercises
47.
cyber security monitoring
48.
cyber security strategies
49.
cyber-security
50.
data and information security
51.
data security
52.
development of security cameras
53.
digital security practices
54.
drinking water security
55.
emotional security
56.
energy security
57.
energy security indicator
58.
Estonian information security standard
59.
graded security
60.
hardware security
61.
hardware security primitive
62.
high level of security
63.
Homeland security
64.
human security
65.
information security
66.
information security and privacy
67.
initial level of security
68.
internal security
69.
international security
70.
investment and innovation security
71.
IPv6 security
72.
IT security
73.
IT security management
74.
job security
75.
long-term security
76.
maritime cyber security
77.
maritime cyber security operations centers
78.
Maritime Security Operations Center (M-SOC)
79.
medium level of security
80.
metadata model for security measures
81.
Middle Eastern security
82.
Mobile security
83.
national cyber security strategy
84.
national security
85.
NATO. Science for Peace and Security Program
86.
network security
87.
network security monitoring
88.
OSCE (Organization for Security and Co-operation in Europe)
89.
passenger’s security
90.
policy-based routing security
91.
political and security cultures
92.
post-quantum security
93.
power system security
94.
quantitative security
95.
regional security
96.
RISC-V Security Verification
97.
Safety and Security in Sea Transportation
98.
safety and security testing
99.
security
100.
security adaptation
101.
security alert prioritization
102.
security analysis
103.
security and justice (AFSJ)
104.
Security and political science
105.
security and privacy
106.
security and privacy in smart grids
107.
Security Assertion
108.
Security Assertion Mining
109.
security closure
110.
Security Coverage
111.
security dataset
112.
security dilemma
113.
Security evaluation
114.
security evaluation instruments
115.
Security Level Evaluation
116.
Security limitations
117.
security log analysis
118.
security management
119.
security model
120.
security monitoring
121.
security notion
122.
security objectives
123.
security of data
124.
security of supply
125.
security operation center
126.
security operations center
127.
security patterns
128.
security policy
129.
security problem definition
130.
security proof
131.
security protocols
132.
security requirements
133.
security requirements engineering
134.
security research
135.
security risk assessment
136.
security risk management
137.
security risks
138.
security science and technology
139.
security strategies
140.
security systems for military objects
141.
security testing
142.
security training
143.
security verification
144.
security-by-design
145.
social security planning
146.
societal security
147.
software security
148.
software security level
149.
software security subcharacteristics
150.
sufficient level of security
151.
system security
152.
terrorism security
153.
transmission System Security
154.
voting privacy and security
155.
asymmetric economic integration
156.
combined heat and power economic dispatch (CHPED)
157.
comparative economic development
158.
comparative economic systems
159.
cubic economic load dispatch
160.
development of economic thought
161.
Early Islamic economic thought
162.
economic
163.
economic policy coordination
164.
economic education
165.
economic activity
166.
Economic Allocation
167.
economic analysis
168.
Economic and Monetary Union
169.
economic and social cohesion
170.
economic and social effects
171.
economic benefits
172.
economic complexity
173.
economic conditions
174.
economic convergence
175.
economic cooperation
176.
economic crisis
177.
economic cycle
178.
Economic Development
179.
Economic Development and Growth
180.
economic development policy
181.
economic developmnet
182.
economic dispatch
183.
economic effect
184.
economic efficiency
185.
economic environment
186.
economic feasibility
187.
economic feasibility analysis
188.
economic fluctuations
189.
economic growth
190.
Economic growth and aggregate productivity regional government analysis
191.
economic history
192.
economic history Europe
193.
economic impact
194.
economic indicators
195.
economic insulation thickness
196.
economic integration
197.
economic interests
198.
economic load dispatch
199.
economic load dispatch (ELD)
200.
Economic Management
201.
economic model
202.
economic modeling
203.
economic motives
204.
economic networks
205.
Economic optimization model
206.
economic performance
207.
economic planning
208.
economic policies
209.
economic policy
210.
Economic policy uncertainty
211.
economic populism
212.
economic power dispatch
213.
economic recession
214.
economic recession of 2008-2011
215.
economic reforms
216.
economic regulation
217.
economic regulation assessment
218.
Economic risk
219.
economic sanctions
220.
economic shocks
221.
economic theory
222.
economic transformations
223.
Economic transit
224.
economic transition
225.
environmental and economic losses of the construction project
226.
environmental and economic regulation
227.
European economic integration
228.
European Economic Space
229.
European history of economic thought
230.
fiscal and economic effects
231.
History of Chinese economic thought and philosophy
232.
history of economic thought before 1750
233.
mathematical models for economic problems
234.
R11 - regional economic activity
235.
regional economic integration
236.
Silk Road Economic Belt
237.
social and economic impacts
238.
social-economic analysis
239.
Socio-economic context
240.
socio-economic development
241.
socio-economic factors
242.
socio-economic impacts
243.
socio-economic risks
244.
socio-economic status
245.
socio-economic system change
246.
sustainable economic growth
247.
techno-economic
248.
Techno-economic analysis
249.
techno-economic assessment
250.
Techno-economic modelling
251.
techno-economic paradigm shifts
252.
techno-economic paradigms
253.
The organisation for economic cooperation and development (OECD)
254.
theory of economic development
255.
unreported economic activity
256.
wear and economic feasibility map
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT