Edasipääsuta leheküljed

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

Järgmised leheküljed ei viita ühelegi teisele KakuWiki leheküljele.

Allpool näidatakse 129 tulemust vahemikus 51179.

Näita ( | järgmised 500) (20 | 50 | 100 | 250 | 500)

  1. IT, riskid ja ergonoomika
  2. IT-professionaal - mis loom see on?
  3. IT ajalugu
  4. IT and Ethics
  5. IT eetika- ja õigusküsimused
  6. IT ja erivajadused
  7. IT juhtimine ja riskihaldus
  8. IT proff...?
  9. IT proff?
  10. IT turva- ja privaatsusküsimused
  11. Info- ja võrguühiskond
  12. Informaatika valikteemade kursuse digiohutuse moodul 2024
  13. Information Society
  14. Information society?
  15. Infoühiskond
  16. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
  17. Intro: the author vs the information society
  18. Juura 1 2022
  19. Juura 2 2022
  20. Kama 9-kumite
  21. Kama kihon
  22. Kihon kumitachi (bokkeniga)
  23. Kogukonnad ja vaba kultuur
  24. Kono ha gaeshi
  25. Kote giri
  26. Kote kage
  27. Kote uchi
  28. Kote wari
  29. Kuidas vaba tarkvaraga äri tehakse
  30. Kumitachi
  31. Laulev revolutsioon
  32. Migi sode kage
  33. Migi yami uchi
  34. Mänglev tarkus: häkkerite lugu
  35. New media, Web 2.0, social software...
  36. Nobody's child - the problem with ordinary computer users
  37. Nuki kote
  38. Nunchaku 12-Kumite
  39. Nunchaku Kihon
  40. One Microsoft Way: the world of proprietary software
  41. PIBKAC
  42. Playful Cleverness
  43. Practices, policies and user education
  44. Professionalism?
  45. Ransho
  46. Rengo
  47. Rid the fools of their money – the online world of crime and fraud
  48. Sai 9-kumite
  49. Sai kihon
  50. Sakugawa no kon sho
  51. Security and Privacy in a Networked World/Cyberwars
  52. Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
  53. Security and Privacy in a Networked World/Networking
  54. Security and Privacy in a Networked World/No Tech Hacking
  55. Security and Privacy in a Networked World/Operating systems
  56. Security and Privacy in a Networked World/PIBKAC
  57. Security and Privacy in a Networked World/Privacy from different angles: Now and then
  58. Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
  59. Security and Privacy in a Networked World/Procedures: Thou shalt not...
  60. Security and Privacy in a Networked World/Programming in Python
  61. Security and Privacy in a Networked World/Social networks and social engineering
  62. Security and Privacy in a Networked World/Technology: A mighty knight with no pants
  63. Security and Privacy in a Networked World/The World of Malware
  64. Security and Privacy in a Networked World/Too easy to misuse
  65. Security and Privacy in a Networked World/Training: Herding cats
  66. Security policy
  67. Sekka gaeshi
  68. Shiho giri
  69. Shushi no kon dai
  70. Shushi no kon sho
  71. Singing revolution
  72. Sissejuhatus teemasse: erivajadused läbi aegade
  73. Software, software and software (and online content too)
  74. Software and Content Licensing
  75. Sotsiaalne tarkvara ja võrgukogukonnad
  76. Suur vend: võrgutsensuur ja privaatsus
  77. Tarzan suurlinnas: võrgusuhtluse erijooned
  78. Tarzan suurlinnas: võrgusuhtluse eripärad
  79. Taura Muso-ryu jo kata
  80. Tehnosuhtluse erialatutvustus
  81. Teistmoodi IT: ligipääsetavus ja puuetega kasutajad
  82. The Big Brother: privacy in the Internet Age
  83. The Big Brother on Menwith Hill
  84. The Digital Divide
  85. The Empowerment: Different People, Digital World
  86. The Equalizer: assistive technology and people with disabilities
  87. The Hacker Ethic in a Networked World
  88. The Millennium Bug in the WIPO model
  89. The Orwellian Internet: online censorship
  90. The Playful Cleverness Reading List
  91. The Quirks of Online Communication
  92. The Story of Cyberspace
  93. The Story of Linux
  94. The Ubiquitous Computing and network society
  95. The Windows Special – viruses and other malware
  96. The broomstick at the door: security and privacy in different times
  97. The clash of motivations: different players in the field
  98. The content models: Creative Commons
  99. The hacker approach: the development of free licenses
  100. The history and development of copyright
  101. The long road: from ENIAC to iPad
  102. The networked world
  103. The proprietary world: WIPO and its ideas of intellectual property
  104. The rise and fall of intellectual property
  105. The security industry
  106. The uneasy alliance: Free Software vs Open Source
  107. The weird ways of online communication
  108. Tonfa
  109. Towards the information society
  110. Tozan no kama
  111. Tsukenshitahaku no sai
  112. Uus- ja sotsiaalmeedia
  113. Uus- ja sotsiaalmeedia Freenetist Snapchatini
  114. Uus meedia 2022
  115. Uus meedia ja sotsiaalne tarkvara
  116. Vaba kultuur - tarkvarale järgnevad teised
  117. Vaba kultuur 2022
  118. Vaba tarkvara
  119. Vaba tarkvara arendusprotsess ja selle eripärad
  120. Vaba tarkvara meetodid ja praktikad 2
  121. Vaba tarkvara olemusest ja levikust
  122. Vaba tarkvara õiguslik taust
  123. Võrgusuhtlus 2022
  124. Võrkude rikkus: vabast tarkvarast vaba kultuurini
  125. What about the future?
  126. Wireless freedom or ubiquitous nightmare?
  127. Yamabiko
  128. Yukidomari
  129. Üldterminite sõnastik

Näita ( | järgmised 500) (20 | 50 | 100 | 250 | 500)