Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
EU Institute for Security Studies (kirjastus/väljaandja)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/238)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Data transfers in EU-India relations
Osula, Anna-Maria
;
Kaushik, Anjali
Directions
2021
/
[1] p. : ill
https://directionsblog.eu/data-transfers-in-eu-india-relations/
artikkel ajakirjas
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
235
1.
EU Accounting Directive 2013/34/EU
2.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security monitoring
15.
cyber security strategies
16.
cyber-security
17.
data and information security
18.
data security
19.
development of security cameras
20.
digital security practices
21.
drinking water security
22.
economic security
23.
economic security of enterprise
24.
emotional security
25.
energy security
26.
energy security indicator
27.
Estonian information security standard
28.
graded security
29.
hardware security
30.
hardware security primitive
31.
high level of security
32.
Homeland security
33.
human security
34.
information security
35.
information security and privacy
36.
initial level of security
37.
internal security
38.
international security
39.
investment and innovation security
40.
IPv6 security
41.
IT security
42.
IT security management
43.
job security
44.
long-term security
45.
maritime cyber security
46.
maritime cyber security operations centers
47.
Maritime Security Operations Center (M-SOC)
48.
medium level of security
49.
metadata model for security measures
50.
Middle Eastern security
51.
Mobile security
52.
national cyber security strategy
53.
national security
54.
NATO. Science for Peace and Security Program
55.
network security
56.
network security monitoring
57.
OSCE (Organization for Security and Co-operation in Europe)
58.
passenger’s security
59.
policy-based routing security
60.
political and security cultures
61.
post-quantum security
62.
power system security
63.
quantitative security
64.
regional security
65.
RISC-V Security Verification
66.
Safety and Security in Sea Transportation
67.
safety and security testing
68.
security
69.
security adaptation
70.
security alert prioritization
71.
security analysis
72.
security and justice (AFSJ)
73.
Security and political science
74.
security and privacy
75.
security and privacy in smart grids
76.
Security Assertion Mining
77.
security closure
78.
Security Coverage
79.
security dataset
80.
security dilemma
81.
Security evaluation
82.
security evaluation instruments
83.
Security limitations
84.
security log analysis
85.
security management
86.
security model
87.
security monitoring
88.
security notion
89.
security objectives
90.
security of data
91.
security of supply
92.
security operation center
93.
security operations center
94.
security patterns
95.
security policy
96.
security problem definition
97.
security proof
98.
security protocols
99.
security requirements
100.
security requirements engineering
101.
security risk assessment
102.
security risk management
103.
security risks
104.
security science and technology
105.
security strategies
106.
security systems for military objects
107.
security testing
108.
security training
109.
security verification
110.
security-by-design
111.
social security planning
112.
societal security
113.
software security
114.
software security level
115.
software security subcharacteristics
116.
sufficient level of security
117.
system of economic security
118.
system security
119.
terrorism security
120.
transmission System Security
121.
voting privacy and security
122.
approximation of Ukrainian legislation to the EU acquis
123.
Austria and the EU
124.
breach of EU law
125.
CELAC-EU Summits
126.
Central Asia and EU
127.
charter of the fundamental rights of the EU
128.
Council of the EU
129.
digital development of the EU
130.
energy market in the EU
131.
EU
132.
EU Strategic Narratives
133.
EU 2020
134.
EU Accountancy Directive 2013/34
135.
EU acquis
136.
EU AI act
137.
EU Building Blocks
138.
EU CCS Directive
139.
EU charter
140.
EU charter of fundamental rights
141.
EU citizenship
142.
EU common bsecurity and foreign policy;
143.
EU competition law
144.
EU competition rules
145.
EU contracts in digital environments
146.
EU Council presidency
147.
EU cyber policy
148.
EU cybersecurity policy
149.
EU defence industrial policy
150.
EU democracy
151.
EU Democracy, Institutional and Parliamentary Law
152.
EU digital
153.
EU digital integration
154.
EU digital management
155.
EU digital product passport
156.
EU digital single market
157.
EU digital sovereignty
158.
EU digitalization
159.
EU directive
160.
EU directive 2014/95EU
161.
EU Eastern cooperation
162.
EU e-governance
163.
Eu Energy Law
164.
EU enlargement
165.
EU enlargements
166.
EU expansion
167.
EU foreign policy
168.
EU framework programs
169.
EU governance
170.
EU H3140
171.
EU heating and cooling strategy
172.
EU history
173.
EU Horizon 2020 research project GRACE (Integrated oil spill response actions and environmental effects)
174.
EU immigration
175.
EU institutions
176.
EU institutions and agencies
177.
EU integration
178.
EU justice and home affairs (JHA)
179.
EU labour and social law
180.
EU law
181.
EU law of child rights
182.
EU legislation
183.
EU Legislation (2022-2024)
184.
EU Mediation Directive
185.
EU member states
186.
EU Member States and e-governance
187.
EU membership
188.
EU merger control
189.
EU migration crisis
190.
EU Neighbourhood Policy
191.
EU new member states
192.
EU pharmacovigilance legislation
193.
EU policies and strategies
194.
EU policy
195.
EU post-2020 biodiversity strategy
196.
EU projects
197.
EU regulation 604/2013
198.
EU regulatory strategy
199.
EU regulatory system for medicines
200.
EU rural policy
201.
EU single digital gateway
202.
EU single market
203.
EU social standards
204.
EU state aid
205.
EU Structural Funds
206.
EU tax law
207.
EU values
208.
EU Water Framework Directive
209.
EU-Catalonia
210.
EU-consistent interpretation
211.
European Union patent (EU patent)
212.
EU-Spain
213.
EU-Ukraine association agreement
214.
Finland and the EU
215.
future of the EU
216.
history of EU integration
217.
implementing of EU law
218.
influence of EU
219.
Machinery Regulation (EU) 2023/1230
220.
management of the EU
221.
new EU Accounting Directive
222.
new EU member states
223.
non-EU countries
224.
primary and secondary law of EU
225.
relaciones EU-Latinoamérica
226.
relations between the United Kingdom and the EU
227.
relationship between national law and EU law
228.
Sweden and the EU
229.
the EU
230.
the EU’s legal profile
231.
the UK in the EU
232.
UK-EU relations
233.
5G EU Toolbox
234.
(Mining and Metallurgy Regions of EU, 2018-2020) MIREU
235.
.eu domain
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
autor
1
1.
Pertel, E.Ü.
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT