Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
internal security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/152)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
artikkel ajakirjas
2
artikkel ajakirjas
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
artikkel ajakirjas
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
150
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal barriers
7.
internal combustion engine
8.
internal combustion engines
9.
internal conditions
10.
internal control
11.
internal coupling
12.
internal damping
13.
internal devaluation
14.
internal discharge
15.
internal friction
16.
internal heat gain
17.
internal insulation
18.
Internal Market and Customs Union
19.
internal mechanics
20.
internal partial discharge
21.
internal pressure
22.
Internal Rate of Return (IRR)
23.
internal representations
24.
internal Rossby radius
25.
internal seiches
26.
internal solitons
27.
internal variables
28.
internal wave
29.
internal waves
30.
internal-flow hydraulic modelling
31.
internal-fow head
32.
single and dual internal variables
33.
ad-hoc sensor networks security
34.
Automatic Security Verification
35.
Blockchain security
36.
cache security
37.
communication system security
38.
comprehensive system of economic security
39.
computer security
40.
cooperative security dilemma
41.
cyber security
42.
cyber security education
43.
cyber security exercises
44.
cyber security monitoring
45.
cyber security strategies
46.
cyber-security
47.
data and information security
48.
data security
49.
development of security cameras
50.
digital security practices
51.
drinking water security
52.
economic security
53.
economic security of enterprise
54.
emotional security
55.
energy security
56.
energy security indicator
57.
Estonian information security standard
58.
graded security
59.
hardware security
60.
hardware security primitive
61.
high level of security
62.
Homeland security
63.
human security
64.
information security
65.
information security and privacy
66.
initial level of security
67.
international security
68.
investment and innovation security
69.
IPv6 security
70.
IT security
71.
IT security management
72.
job security
73.
long-term security
74.
maritime cyber security
75.
maritime cyber security operations centers
76.
Maritime Security Operations Center (M-SOC)
77.
medium level of security
78.
metadata model for security measures
79.
Middle Eastern security
80.
Mobile security
81.
national cyber security strategy
82.
national security
83.
NATO. Science for Peace and Security Program
84.
network security
85.
network security monitoring
86.
OSCE (Organization for Security and Co-operation in Europe)
87.
passenger’s security
88.
policy-based routing security
89.
political and security cultures
90.
post-quantum security
91.
power system security
92.
quantitative security
93.
regional security
94.
RISC-V Security Verification
95.
Safety and Security in Sea Transportation
96.
safety and security testing
97.
security
98.
security adaptation
99.
security alert prioritization
100.
security analysis
101.
security and justice (AFSJ)
102.
Security and political science
103.
security and privacy
104.
security and privacy in smart grids
105.
Security Assertion Mining
106.
security closure
107.
Security Coverage
108.
security dataset
109.
security dilemma
110.
Security evaluation
111.
security evaluation instruments
112.
Security limitations
113.
security log analysis
114.
security management
115.
security model
116.
security monitoring
117.
security notion
118.
security objectives
119.
security of data
120.
security of supply
121.
security operation center
122.
security operations center
123.
security patterns
124.
security policy
125.
security problem definition
126.
security proof
127.
security protocols
128.
security requirements
129.
security requirements engineering
130.
security risk assessment
131.
security risk management
132.
security risks
133.
security science and technology
134.
security strategies
135.
security systems for military objects
136.
security testing
137.
security training
138.
security verification
139.
security-by-design
140.
social security planning
141.
societal security
142.
software security
143.
software security level
144.
software security subcharacteristics
145.
sufficient level of security
146.
system of economic security
147.
system security
148.
terrorism security
149.
transmission System Security
150.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT