Edasipääsuta leheküljed

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

Järgmised leheküljed ei viita ühelegi teisele KakuWiki leheküljele.

Allpool näidatakse 100 tulemust vahemikus 21120.

Näita ( | ) (20 | 50 | 100 | 250 | 500)

  1. Arvutid ja paragrahvid II: tarkvara- ja sisulitsentsid
  2. Arvutuspulkadest superarvutini: noppeid IT ajaloost
  3. Assignment
  4. Bo 10-kumite
  5. Bo 15-kumite
  6. Bo kihon
  7. Can Property Be Intellectual?
  8. Censorship, Privacy and Internet
  9. Censorship and privacy in the Net
  10. Chi-kung
  11. Contracts and licenses
  12. Cyberwars
  13. Cyberwars: politics and technology
  14. Dumb and dumber
  15. E-Ülikooli konverents 2007 Tartus - ettekande viited
  16. Eetika ja IT
  17. FLOSS - history and concepts
  18. From ENIAC to iPad
  19. From Hacktivism to Cyberwar
  20. Gunshu
  21. Hackers, crackers and coloured hats
  22. Hackers...?
  23. Hackers: the techno-culture
  24. Harjutusi eri paigust
  25. Hidari sode kage
  26. Hidari yami uchi
  27. Hosomichi
  28. Häkkerid ja kogukonnad
  29. IMKE WikiLab sandbox
  30. IT, Risks and Ergonomics
  31. IT, riskid ja ergonoomika
  32. IT-professionaal - mis loom see on?
  33. IT ajalugu
  34. IT and Ethics
  35. IT eetika- ja õigusküsimused
  36. IT ja erivajadused
  37. IT juhtimine ja riskihaldus
  38. IT proff...?
  39. IT proff?
  40. IT turva- ja privaatsusküsimused
  41. Info- ja võrguühiskond
  42. Informaatika valikteemade kursuse digiohutuse moodul 2024
  43. Information Society
  44. Information society?
  45. Infoühiskond
  46. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
  47. Intro: the author vs the information society
  48. Juura 1 2022
  49. Juura 2 2022
  50. Kama 9-kumite
  51. Kama kihon
  52. Kihon kumitachi (bokkeniga)
  53. Kogukonnad ja vaba kultuur
  54. Kono ha gaeshi
  55. Kote giri
  56. Kote kage
  57. Kote uchi
  58. Kote wari
  59. Kuidas vaba tarkvaraga äri tehakse
  60. Kumitachi
  61. Laulev revolutsioon
  62. Migi sode kage
  63. Migi yami uchi
  64. Mänglev tarkus: häkkerite lugu
  65. New media, Web 2.0, social software...
  66. Nobody's child - the problem with ordinary computer users
  67. Nuki kote
  68. Nunchaku 12-Kumite
  69. Nunchaku Kihon
  70. One Microsoft Way: the world of proprietary software
  71. PIBKAC
  72. Playful Cleverness
  73. Practices, policies and user education
  74. Professionalism?
  75. Ransho
  76. Rengo
  77. Rid the fools of their money – the online world of crime and fraud
  78. Sai 9-kumite
  79. Sai kihon
  80. Sakugawa no kon sho
  81. Security and Privacy in a Networked World/Cyberwars
  82. Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
  83. Security and Privacy in a Networked World/Networking
  84. Security and Privacy in a Networked World/No Tech Hacking
  85. Security and Privacy in a Networked World/Operating systems
  86. Security and Privacy in a Networked World/PIBKAC
  87. Security and Privacy in a Networked World/Privacy from different angles: Now and then
  88. Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
  89. Security and Privacy in a Networked World/Procedures: Thou shalt not...
  90. Security and Privacy in a Networked World/Programming in Python
  91. Security and Privacy in a Networked World/Social networks and social engineering
  92. Security and Privacy in a Networked World/Technology: A mighty knight with no pants
  93. Security and Privacy in a Networked World/The World of Malware
  94. Security and Privacy in a Networked World/Too easy to misuse
  95. Security and Privacy in a Networked World/Training: Herding cats
  96. Security policy
  97. Sekka gaeshi
  98. Shiho giri
  99. Shushi no kon dai
  100. Shushi no kon sho

Näita ( | ) (20 | 50 | 100 | 250 | 500)