Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
internal security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/158)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
artikkel ajakirjas
2
artikkel ajakirjas
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
artikkel ajakirjas
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
156
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal barriers
7.
internal combustion engine
8.
internal combustion engines
9.
internal conditions
10.
internal control
11.
internal coupling
12.
internal damping
13.
internal devaluation
14.
internal discharge
15.
internal friction
16.
internal heat gain
17.
internal insulation
18.
Internal Market and Customs Union
19.
internal mechanics
20.
internal partial discharge
21.
internal pressure
22.
Internal Rate of Return (IRR)
23.
internal representations
24.
internal Rossby radius
25.
internal seiches
26.
internal solitons
27.
internal variables
28.
internal wave
29.
internal waves
30.
internal-flow hydraulic modelling
31.
internal-fow head
32.
single and dual internal variables
33.
ad-hoc sensor networks security
34.
Automatic Security Verification
35.
Blockchain security
36.
cache security
37.
cloud security
38.
communication system security
39.
comprehensive system of economic security
40.
computer security
41.
cooperative security dilemma
42.
cyber security
43.
cyber security education
44.
cyber security exercises
45.
cyber security monitoring
46.
cyber security monitoring in maritime
47.
cyber security strategies
48.
cyber-physical system security
49.
cyber-security
50.
data and information security
51.
data security
52.
development of security cameras
53.
digital security practices
54.
drinking water security
55.
economic security
56.
economic security of enterprise
57.
emotional security
58.
energy security
59.
energy security indicator
60.
Estonian information security standard
61.
graded security
62.
hardware security
63.
hardware security primitive
64.
high level of security
65.
Homeland security
66.
human security
67.
information security
68.
information security and privacy
69.
initial level of security
70.
international security
71.
investment and innovation security
72.
IPv6 security
73.
IT security
74.
IT security management
75.
job security
76.
long-term security
77.
maritime cyber security
78.
maritime cyber security operations centers
79.
Maritime Security Operations Center (M-SOC)
80.
medium level of security
81.
metadata model for security measures
82.
Middle Eastern security
83.
Mobile security
84.
national cyber security strategy
85.
national security
86.
NATO. Science for Peace and Security Program
87.
network security
88.
network security monitoring
89.
OSCE (Organization for Security and Co-operation in Europe)
90.
passenger’s security
91.
policy-based routing security
92.
political and security cultures
93.
post-quantum security
94.
power system security
95.
quantitative security
96.
regional security
97.
RISC-V Security Verification
98.
Safety and Security in Sea Transportation
99.
safety and security testing
100.
security
101.
security adaptation
102.
security alert prioritization
103.
security analysis
104.
security and justice (AFSJ)
105.
Security and political science
106.
security and privacy
107.
security and privacy in smart grids
108.
Security Assertion
109.
Security Assertion Mining
110.
security closure
111.
Security Coverage
112.
security dataset
113.
security dilemma
114.
Security evaluation
115.
security evaluation instruments
116.
Security Level Evaluation
117.
Security limitations
118.
security log analysis
119.
security management
120.
security model
121.
security monitoring
122.
security notion
123.
security objectives
124.
security of data
125.
security of supply
126.
security operation center
127.
security operations center
128.
security patterns
129.
security policy
130.
security problem definition
131.
security proof
132.
security protocols
133.
security requirements
134.
security requirements engineering
135.
security research
136.
security risk assessment
137.
security risk management
138.
security risks
139.
security science and technology
140.
security strategies
141.
security systems for military objects
142.
security testing
143.
security training
144.
security verification
145.
security-by-design
146.
social security planning
147.
societal security
148.
software security
149.
software security level
150.
software security subcharacteristics
151.
sufficient level of security
152.
system of economic security
153.
system security
154.
terrorism security
155.
transmission System Security
156.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT