Kategoriseerimata leheküljed
Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
Allpool näidatakse 100 tulemust vahemikus 51–150.
- History and visions of interactive media
- Hosomichi
- Häkkerid ja kogukonnad
- IMKE
- IMKE WikiLab sandbox
- IT, Risks and Ergonomics
- IT, riskid ja ergonoomika
- IT ajalugu
- IT and Ethics
- IT eetika- ja õigusküsimused
- IT eetilised, sotsiaalsed ja professionaalsed aspektid 2016
- IT eetilised, sotsiaalsed ja professionaalsed aspektid 2017
- IT eetilised, sotsiaalsed ja professionaalsed aspektid 2022
- IT ja erivajadused
- IT juhtimine ja riskihaldus
- IT proff...?
- IT proff?
- IT turva- ja privaatsusküsimused
- Iaijutsu
- Informaatika valikteemade kursuse digiohutuse moodul 2024
- Information Society
- Information society?
- Infotehnoloogia eetilised, sotsiaalsed ja professionaalsed aspektid
- Infoühiskond
- Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
- Intellectual property in the age of new media
- Intro: the author vs the information society
- Juura 1 2022
- Juura 2 2022
- Kama
- Kama 9-kumite
- Kama kihon
- Kihon kumitachi (bokkeniga)
- Kogukonnad ja vaba kultuur
- Kono ha gaeshi
- Kote giri
- Kote kage
- Kote uchi
- Kote wari
- Kuidas vaba tarkvaraga äri tehakse
- Kumitachi
- Laulev revolutsioon
- Linux, hackers and the Free Culture
- Main Page
- Migi sode kage
- Migi yami uchi
- Mänglev tarkus: häkkerite lugu
- New media, Web 2.0, social software...
- Nobody's child - the problem with ordinary computer users
- Noppeid IT ajaloost
- Nuki kote
- Nunchaku
- Nunchaku 12-Kumite
- Nunchaku Kihon
- One Microsoft Way: the world of proprietary software
- Open Source management
- PIBKAC
- Playful Cleverness
- Political and social aspects of digital interactive media
- Practices, policies and user education
- Professionalism?
- Ransho
- Rengo
- Rid the fools of their money – the online world of crime and fraud
- SPEAIT
- SPEIT for EITC CyberSecurity curriculum
- Sai
- Sai 9-kumite
- Sai kihon
- Sakugawa no kon sho
- Security and Privacy in a Networked World/Cyberwars
- Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
- Security and Privacy in a Networked World/Networking
- Security and Privacy in a Networked World/No Tech Hacking
- Security and Privacy in a Networked World/Operating systems
- Security and Privacy in a Networked World/PIBKAC
- Security and Privacy in a Networked World/Privacy from different angles: Now and then
- Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
- Security and Privacy in a Networked World/Procedures: Thou shalt not...
- Security and Privacy in a Networked World/Programming in Python
- Security and Privacy in a Networked World/Social networks and social engineering
- Security and Privacy in a Networked World/Technology: A mighty knight with no pants
- Security and Privacy in a Networked World/The World of Malware
- Security and Privacy in a Networked World/Too easy to misuse
- Security and Privacy in a Networked World/Training: Herding cats
- Security and privacy issues
- Security policy
- Sekka gaeshi
- Shiho giri
- Shushi no kon dai
- Shushi no kon sho
- Singing revolution
- Sissejuhatus teemasse: erivajadused läbi aegade
- Software, software and software (and online content too)
- Software and Content Licensing
- Sotsiaalne tarkvara ja võrgukogukonnad
- Tarzan suurlinnas: võrgusuhtluse eripärad
- Taura Muso-ryu jo kata
- Tehnosuhtluse erialatutvustus
- Teistmoodi IT: erivajadused ja -lahendused