Kategoriseerimata leheküljed

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

Allpool näidatakse 201 tulemust vahemikus 1201.

Näita (eelmised 250 | järgmised 250) (20 | 50 | 100 | 250 | 500)

  1. (The Not So) New Media
  2. 1.Community – what's that?
  3. 1. põhitehnikaseeria
  4. 14.The security industry
  5. 3.Overview of freely available security-related software
  6. 3.Social software – building blocks of online communities
  7. 4.Understanding firewalls
  8. 6.Hackers, crackers and coloured hats
  9. 7.The Big Brother: privacy in the Internet Age
  10. 7.The blogosphere: you can be a journalist, too!
  11. 9.Wireless freedom or ubiquitous nightmare?
  12. ARPANetist Facebookini: Interneti kujunemislugu
  13. A Different Kind of IT
  14. A Fool Gets Beaten Even in Internet
  15. Andmeturve: tehnoloogia, koolitus ja reeglid
  16. Andmeturve 2022
  17. Arendus- ja ärimudelid
  18. Arendusvahendid - wiki, trac, Subversion
  19. Arvutid ja paragrahvid: juriidika arvutimaailmas
  20. Arvutuspulkadest superarvutini: noppeid IT ajaloost
  21. Assignment
  22. Bo
  23. Bo 10-kumite
  24. Bo 15-kumite
  25. Bo kihon
  26. Bydgoszcz
  27. Can Property Be Intellectual?
  28. Censorship, Privacy and Internet
  29. Censorship and privacy in the Net
  30. Chi-kung
  31. Communities and social software
  32. Contracts and licenses
  33. Cyberwars
  34. Cyberwars: politics and technology
  35. Dumb and dumber
  36. E-Ülikooli konverents 2007 Tartus - ettekande viited
  37. Eetika ja IT
  38. Esileht
  39. Ethics & Law in New Media
  40. FLOSS - history and concepts
  41. From ENIAC to iPad
  42. From Hacktivism to Cyberwar
  43. Gunshu
  44. Hackers, crackers and coloured hats
  45. Hackers...?
  46. Hackers: the techno-culture
  47. Haridustehnoloogia erivajadustega inimestele
  48. Harjutusi eri paigust
  49. Hidari sode kage
  50. Hidari yami uchi
  51. History and visions of interactive media
  52. Hosomichi
  53. Häkkerid ja kogukonnad
  54. IMKE
  55. IMKE WikiLab sandbox
  56. IT, Risks and Ergonomics
  57. IT, riskid ja ergonoomika
  58. IT ajalugu
  59. IT and Ethics
  60. IT eetika- ja õigusküsimused
  61. IT eetilised, sotsiaalsed ja professionaalsed aspektid 2016
  62. IT eetilised, sotsiaalsed ja professionaalsed aspektid 2017
  63. IT eetilised, sotsiaalsed ja professionaalsed aspektid 2022
  64. IT ja erivajadused
  65. IT juhtimine ja riskihaldus
  66. IT proff...?
  67. IT proff?
  68. IT turva- ja privaatsusküsimused
  69. Iaijutsu
  70. Informaatika valikteemade kursuse digiohutuse moodul 2024
  71. Information Society
  72. Information society?
  73. Infotehnoloogia eetilised, sotsiaalsed ja professionaalsed aspektid
  74. Infoühiskond
  75. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
  76. Intellectual property in the age of new media
  77. Intro: the author vs the information society
  78. Juura 1 2022
  79. Juura 2 2022
  80. Kama
  81. Kama 9-kumite
  82. Kama kihon
  83. Kihon kumitachi (bokkeniga)
  84. Kogukonnad ja vaba kultuur
  85. Kono ha gaeshi
  86. Kote giri
  87. Kote kage
  88. Kote uchi
  89. Kote wari
  90. Kuidas vaba tarkvaraga äri tehakse
  91. Kumitachi
  92. Laulev revolutsioon
  93. Linux, hackers and the Free Culture
  94. Main Page
  95. Migi sode kage
  96. Migi yami uchi
  97. Mänglev tarkus: häkkerite lugu
  98. New media, Web 2.0, social software...
  99. Nobody's child - the problem with ordinary computer users
  100. Noppeid IT ajaloost
  101. Nuki kote
  102. Nunchaku
  103. Nunchaku 12-Kumite
  104. Nunchaku Kihon
  105. One Microsoft Way: the world of proprietary software
  106. Open Source management
  107. PIBKAC
  108. Playful Cleverness
  109. Political and social aspects of digital interactive media
  110. Practices, policies and user education
  111. Professionalism?
  112. Ransho
  113. Rengo
  114. Rid the fools of their money – the online world of crime and fraud
  115. SPEAIT
  116. SPEIT for EITC CyberSecurity curriculum
  117. Sai
  118. Sai 9-kumite
  119. Sai kihon
  120. Sakugawa no kon sho
  121. Security and Privacy in a Networked World/Cyberwars
  122. Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
  123. Security and Privacy in a Networked World/Networking
  124. Security and Privacy in a Networked World/No Tech Hacking
  125. Security and Privacy in a Networked World/Operating systems
  126. Security and Privacy in a Networked World/PIBKAC
  127. Security and Privacy in a Networked World/Privacy from different angles: Now and then
  128. Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
  129. Security and Privacy in a Networked World/Procedures: Thou shalt not...
  130. Security and Privacy in a Networked World/Programming in Python
  131. Security and Privacy in a Networked World/Social networks and social engineering
  132. Security and Privacy in a Networked World/Technology: A mighty knight with no pants
  133. Security and Privacy in a Networked World/The World of Malware
  134. Security and Privacy in a Networked World/Too easy to misuse
  135. Security and Privacy in a Networked World/Training: Herding cats
  136. Security and privacy issues
  137. Security policy
  138. Sekka gaeshi
  139. Shiho giri
  140. Shushi no kon dai
  141. Shushi no kon sho
  142. Singing revolution
  143. Sissejuhatus teemasse: erivajadused läbi aegade
  144. Software, software and software (and online content too)
  145. Software and Content Licensing
  146. Sotsiaalne tarkvara ja võrgukogukonnad
  147. Tarzan suurlinnas: võrgusuhtluse eripärad
  148. Taura Muso-ryu jo kata
  149. Tehnosuhtluse erialatutvustus
  150. Teistmoodi IT: erivajadused ja -lahendused
  151. Teistmoodi IT: ligipääsetavus ja puuetega kasutajad
  152. The Big Brother: privacy in the Internet Age
  153. The Big Brother on Menwith Hill
  154. The Dark Side and the Fool's Gold
  155. The Digital Divide
  156. The Empowerment: Different People, Digital World
  157. The Equalizer: assistive technology and people with disabilities
  158. The Hacker Ethic in a Networked World
  159. The Millennium Bug in the WIPO model
  160. The Orwellian Internet: online censorship
  161. The Playful Cleverness Reading List
  162. The Quirks of Online Communication
  163. The Story of Cyberspace
  164. The Story of Linux
  165. The Ubiquitous Computing and network society
  166. The Windows Special – viruses and other malware
  167. The broomstick at the door: security and privacy in different times
  168. The clash of motivations: different players in the field
  169. The content models: Creative Commons
  170. The hacker approach: the development of free licenses
  171. The history and development of copyright
  172. The long road: from ENIAC to iPad
  173. The networked world
  174. The proprietary world: WIPO and its ideas of intellectual property
  175. The rise and fall of intellectual property
  176. The security industry
  177. The uneasy alliance: Free Software vs Open Source
  178. The weird ways of online communication
  179. Tonfa
  180. Towards the information society
  181. Tozan no kama
  182. Tsukenshitahaku no sai
  183. Uus- ja sotsiaalmeedia
  184. Uus- ja sotsiaalmeedia Freenetist Snapchatini
  185. Uus meedia 2022
  186. Vaba kultuur - tarkvarale järgnevad teised
  187. Vaba kultuur 2022
  188. Vaba tarkvara
  189. Vaba tarkvara arendusprotsess ja selle eripärad
  190. Vaba tarkvara meetodid ja praktikad
  191. Vaba tarkvara meetodid ja praktikad 2
  192. Vaba tarkvara olemusest ja levikust
  193. Vaba tarkvara õiguslik taust
  194. Võitluskunstid
  195. Võrgusuhtlus 2022
  196. Võrkude rikkus: vabast tarkvarast vaba kultuurini
  197. What about the future?
  198. Wireless freedom or ubiquitous nightmare?
  199. Yamabiko
  200. Yukidomari
  201. Üldterminite sõnastik

Näita (eelmised 250 | järgmised 250) (20 | 50 | 100 | 250 | 500)