Kategoriseerimata leheküljed

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

Allpool näidatakse 100 tulemust vahemikus 71170.

Näita ( | ) (20 | 50 | 100 | 250 | 500)

  1. Information Society
  2. Information society?
  3. Infotehnoloogia eetilised, sotsiaalsed ja professionaalsed aspektid
  4. Infoühiskond
  5. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
  6. Intellectual property in the age of new media
  7. Intro: the author vs the information society
  8. Juura 1 2022
  9. Juura 2 2022
  10. Kama
  11. Kama 9-kumite
  12. Kama kihon
  13. Kihon kumitachi (bokkeniga)
  14. Kogukonnad ja vaba kultuur
  15. Kono ha gaeshi
  16. Kote giri
  17. Kote kage
  18. Kote uchi
  19. Kote wari
  20. Kuidas vaba tarkvaraga äri tehakse
  21. Kumitachi
  22. Laulev revolutsioon
  23. Linux, hackers and the Free Culture
  24. Main Page
  25. Migi sode kage
  26. Migi yami uchi
  27. Mänglev tarkus: häkkerite lugu
  28. New media, Web 2.0, social software...
  29. Nobody's child - the problem with ordinary computer users
  30. Noppeid IT ajaloost
  31. Nuki kote
  32. Nunchaku
  33. Nunchaku 12-Kumite
  34. Nunchaku Kihon
  35. One Microsoft Way: the world of proprietary software
  36. Open Source management
  37. PIBKAC
  38. Playful Cleverness
  39. Political and social aspects of digital interactive media
  40. Practices, policies and user education
  41. Professionalism?
  42. Ransho
  43. Rengo
  44. Rid the fools of their money – the online world of crime and fraud
  45. SPEAIT
  46. SPEIT for EITC CyberSecurity curriculum
  47. Sai
  48. Sai 9-kumite
  49. Sai kihon
  50. Sakugawa no kon sho
  51. Security and Privacy in a Networked World/Cyberwars
  52. Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
  53. Security and Privacy in a Networked World/Networking
  54. Security and Privacy in a Networked World/No Tech Hacking
  55. Security and Privacy in a Networked World/Operating systems
  56. Security and Privacy in a Networked World/PIBKAC
  57. Security and Privacy in a Networked World/Privacy from different angles: Now and then
  58. Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
  59. Security and Privacy in a Networked World/Procedures: Thou shalt not...
  60. Security and Privacy in a Networked World/Programming in Python
  61. Security and Privacy in a Networked World/Social networks and social engineering
  62. Security and Privacy in a Networked World/Technology: A mighty knight with no pants
  63. Security and Privacy in a Networked World/The World of Malware
  64. Security and Privacy in a Networked World/Too easy to misuse
  65. Security and Privacy in a Networked World/Training: Herding cats
  66. Security and privacy issues
  67. Security policy
  68. Sekka gaeshi
  69. Shiho giri
  70. Shushi no kon dai
  71. Shushi no kon sho
  72. Singing revolution
  73. Sissejuhatus teemasse: erivajadused läbi aegade
  74. Software, software and software (and online content too)
  75. Software and Content Licensing
  76. Sotsiaalne tarkvara ja võrgukogukonnad
  77. Tarzan suurlinnas: võrgusuhtluse eripärad
  78. Taura Muso-ryu jo kata
  79. Tehnosuhtluse erialatutvustus
  80. Teistmoodi IT: erivajadused ja -lahendused
  81. Teistmoodi IT: ligipääsetavus ja puuetega kasutajad
  82. The Big Brother: privacy in the Internet Age
  83. The Big Brother on Menwith Hill
  84. The Dark Side and the Fool's Gold
  85. The Digital Divide
  86. The Empowerment: Different People, Digital World
  87. The Equalizer: assistive technology and people with disabilities
  88. The Hacker Ethic in a Networked World
  89. The Millennium Bug in the WIPO model
  90. The Orwellian Internet: online censorship
  91. The Playful Cleverness Reading List
  92. The Quirks of Online Communication
  93. The Story of Cyberspace
  94. The Story of Linux
  95. The Ubiquitous Computing and network society
  96. The Windows Special – viruses and other malware
  97. The broomstick at the door: security and privacy in different times
  98. The clash of motivations: different players in the field
  99. The content models: Creative Commons
  100. The hacker approach: the development of free licenses

Näita ( | ) (20 | 50 | 100 | 250 | 500)