Edasipääsuta leheküljed

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

Järgmised leheküljed ei viita ühelegi teisele KakuWiki leheküljele.

Allpool näidatakse 100 tulemust vahemikus 51150.

Näita ( | ) (20 | 50 | 100 | 250 | 500)

  1. IT, riskid ja ergonoomika
  2. IT-professionaal - mis loom see on?
  3. IT ajalugu
  4. IT and Ethics
  5. IT eetika- ja õigusküsimused
  6. IT ja erivajadused
  7. IT juhtimine ja riskihaldus
  8. IT proff...?
  9. IT proff?
  10. IT turva- ja privaatsusküsimused
  11. Info- ja võrguühiskond
  12. Informaatika valikteemade kursuse digiohutuse moodul 2024
  13. Information Society
  14. Information society?
  15. Infoühiskond
  16. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
  17. Intro: the author vs the information society
  18. Juura 1 2022
  19. Juura 2 2022
  20. Kama 9-kumite
  21. Kama kihon
  22. Kihon kumitachi (bokkeniga)
  23. Kogukonnad ja vaba kultuur
  24. Kono ha gaeshi
  25. Kote giri
  26. Kote kage
  27. Kote uchi
  28. Kote wari
  29. Kuidas vaba tarkvaraga äri tehakse
  30. Kumitachi
  31. Laulev revolutsioon
  32. Migi sode kage
  33. Migi yami uchi
  34. Mänglev tarkus: häkkerite lugu
  35. New media, Web 2.0, social software...
  36. Nobody's child - the problem with ordinary computer users
  37. Nuki kote
  38. Nunchaku 12-Kumite
  39. Nunchaku Kihon
  40. One Microsoft Way: the world of proprietary software
  41. PIBKAC
  42. Playful Cleverness
  43. Practices, policies and user education
  44. Professionalism?
  45. Ransho
  46. Rengo
  47. Rid the fools of their money – the online world of crime and fraud
  48. Sai 9-kumite
  49. Sai kihon
  50. Sakugawa no kon sho
  51. Security and Privacy in a Networked World/Cyberwars
  52. Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
  53. Security and Privacy in a Networked World/Networking
  54. Security and Privacy in a Networked World/No Tech Hacking
  55. Security and Privacy in a Networked World/Operating systems
  56. Security and Privacy in a Networked World/PIBKAC
  57. Security and Privacy in a Networked World/Privacy from different angles: Now and then
  58. Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
  59. Security and Privacy in a Networked World/Procedures: Thou shalt not...
  60. Security and Privacy in a Networked World/Programming in Python
  61. Security and Privacy in a Networked World/Social networks and social engineering
  62. Security and Privacy in a Networked World/Technology: A mighty knight with no pants
  63. Security and Privacy in a Networked World/The World of Malware
  64. Security and Privacy in a Networked World/Too easy to misuse
  65. Security and Privacy in a Networked World/Training: Herding cats
  66. Security policy
  67. Sekka gaeshi
  68. Shiho giri
  69. Shushi no kon dai
  70. Shushi no kon sho
  71. Singing revolution
  72. Sissejuhatus teemasse: erivajadused läbi aegade
  73. Software, software and software (and online content too)
  74. Software and Content Licensing
  75. Sotsiaalne tarkvara ja võrgukogukonnad
  76. Suur vend: võrgutsensuur ja privaatsus
  77. Tarzan suurlinnas: võrgusuhtluse erijooned
  78. Tarzan suurlinnas: võrgusuhtluse eripärad
  79. Taura Muso-ryu jo kata
  80. Tehnosuhtluse erialatutvustus
  81. Teistmoodi IT: ligipääsetavus ja puuetega kasutajad
  82. The Big Brother: privacy in the Internet Age
  83. The Big Brother on Menwith Hill
  84. The Digital Divide
  85. The Empowerment: Different People, Digital World
  86. The Equalizer: assistive technology and people with disabilities
  87. The Hacker Ethic in a Networked World
  88. The Millennium Bug in the WIPO model
  89. The Orwellian Internet: online censorship
  90. The Playful Cleverness Reading List
  91. The Quirks of Online Communication
  92. The Story of Cyberspace
  93. The Story of Linux
  94. The Ubiquitous Computing and network society
  95. The Windows Special – viruses and other malware
  96. The broomstick at the door: security and privacy in different times
  97. The clash of motivations: different players in the field
  98. The content models: Creative Commons
  99. The hacker approach: the development of free licenses
  100. The history and development of copyright

Näita ( | ) (20 | 50 | 100 | 250 | 500)