Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
internal security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/156)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
European internal security interests and Brexit. Legal and operational aspects of the post–Brexit cooperation model
Loik, Ramon
Romanian journal of European affairs
2020
/
p. 5-17
http://rjea.ier.gov.ro/en/issues/rjea-vol-20-no-2-december-2020/
artikkel ajakirjas
2
artikkel ajakirjas
Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitluses
Randlane, Kerly
Sisekaitseakadeemia toimetised
2011
/
lk. 284-301
artikkel ajakirjas
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
154
1.
internal security
2.
corresponding internal variable
3.
dual internal variables
4.
hierarchical internal variable
5.
internal audit
6.
internal barriers
7.
internal combustion engine
8.
internal combustion engines
9.
internal conditions
10.
internal control
11.
internal coupling
12.
internal damping
13.
internal devaluation
14.
internal discharge
15.
internal friction
16.
internal heat gain
17.
internal insulation
18.
Internal Market and Customs Union
19.
internal mechanics
20.
internal partial discharge
21.
internal pressure
22.
Internal Rate of Return (IRR)
23.
internal representations
24.
internal Rossby radius
25.
internal seiches
26.
internal solitons
27.
internal variables
28.
internal wave
29.
internal waves
30.
internal-flow hydraulic modelling
31.
internal-fow head
32.
single and dual internal variables
33.
ad-hoc sensor networks security
34.
Automatic Security Verification
35.
Blockchain security
36.
cache security
37.
cloud security
38.
communication system security
39.
comprehensive system of economic security
40.
computer security
41.
cooperative security dilemma
42.
cyber security
43.
cyber security education
44.
cyber security exercises
45.
cyber security monitoring
46.
cyber security strategies
47.
cyber-security
48.
data and information security
49.
data security
50.
development of security cameras
51.
digital security practices
52.
drinking water security
53.
economic security
54.
economic security of enterprise
55.
emotional security
56.
energy security
57.
energy security indicator
58.
Estonian information security standard
59.
graded security
60.
hardware security
61.
hardware security primitive
62.
high level of security
63.
Homeland security
64.
human security
65.
information security
66.
information security and privacy
67.
initial level of security
68.
international security
69.
investment and innovation security
70.
IPv6 security
71.
IT security
72.
IT security management
73.
job security
74.
long-term security
75.
maritime cyber security
76.
maritime cyber security operations centers
77.
Maritime Security Operations Center (M-SOC)
78.
medium level of security
79.
metadata model for security measures
80.
Middle Eastern security
81.
Mobile security
82.
national cyber security strategy
83.
national security
84.
NATO. Science for Peace and Security Program
85.
network security
86.
network security monitoring
87.
OSCE (Organization for Security and Co-operation in Europe)
88.
passenger’s security
89.
policy-based routing security
90.
political and security cultures
91.
post-quantum security
92.
power system security
93.
quantitative security
94.
regional security
95.
RISC-V Security Verification
96.
Safety and Security in Sea Transportation
97.
safety and security testing
98.
security
99.
security adaptation
100.
security alert prioritization
101.
security analysis
102.
security and justice (AFSJ)
103.
Security and political science
104.
security and privacy
105.
security and privacy in smart grids
106.
Security Assertion
107.
Security Assertion Mining
108.
security closure
109.
Security Coverage
110.
security dataset
111.
security dilemma
112.
Security evaluation
113.
security evaluation instruments
114.
Security Level Evaluation
115.
Security limitations
116.
security log analysis
117.
security management
118.
security model
119.
security monitoring
120.
security notion
121.
security objectives
122.
security of data
123.
security of supply
124.
security operation center
125.
security operations center
126.
security patterns
127.
security policy
128.
security problem definition
129.
security proof
130.
security protocols
131.
security requirements
132.
security requirements engineering
133.
security research
134.
security risk assessment
135.
security risk management
136.
security risks
137.
security science and technology
138.
security strategies
139.
security systems for military objects
140.
security testing
141.
security training
142.
security verification
143.
security-by-design
144.
social security planning
145.
societal security
146.
software security
147.
software security level
148.
software security subcharacteristics
149.
sufficient level of security
150.
system of economic security
151.
system security
152.
terrorism security
153.
transmission System Security
154.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT