Kategoriseerimata leheküljed

Allikas: KakuWiki
Jump to navigationJump to search

Allpool näidatakse 187 tulemust vahemikus 1187.

Näita (eelmised 250 | järgmised 250) (20 | 50 | 100 | 250 | 500)

  1. (The Not So) New Media
  2. 1.Community – what's that?
  3. 1. põhitehnikaseeria
  4. 10-kumite
  5. 14.The security industry
  6. 15-kumite
  7. 3.Overview of freely available security-related software
  8. 3.Social software – building blocks of online communities
  9. 4.Understanding firewalls
  10. 6.Hackers, crackers and coloured hats
  11. 7.The Big Brother: privacy in the Internet Age
  12. 7.The blogosphere: you can be a journalist, too!
  13. 9.Wireless freedom or ubiquitous nightmare?
  14. ARPANetist Facebookini: Interneti kujunemislugu
  15. A Different Kind of IT
  16. A Fool Gets Beaten Even in Internet
  17. Andmeturve: tehnoloogia, koolitus ja reeglid
  18. Arendus- ja ärimudelid
  19. Arendusvahendid - wiki, trac, Subversion
  20. Arvutid ja paragrahvid: juriidika arvutimaailmas
  21. Arvutuspulkadest superarvutini: noppeid IT ajaloost
  22. Assignment
  23. Bo
  24. Bydgoszcz
  25. Can Property Be Intellectual?
  26. Censorship, Privacy and Internet
  27. Censorship and privacy in the Net
  28. Chi-kung
  29. Communities and social software
  30. Contracts and licenses
  31. Cyberwars
  32. Cyberwars: politics and technology
  33. Dumb and dumber
  34. E-Ülikooli konverents 2007 Tartus - ettekande viited
  35. Eetika ja IT
  36. Esileht
  37. Ethics & Law in New Media
  38. FLOSS - history and concepts
  39. From ENIAC to iPad
  40. From Hacktivism to Cyberwar
  41. Gunshu
  42. Hackers, crackers and coloured hats
  43. Hackers...?
  44. Hackers: the techno-culture
  45. Haridustehnoloogia erivajadustega inimestele
  46. Harjutusi eri paigust
  47. Hidari sode kage
  48. Hidari yami uchi
  49. History and visions of interactive media
  50. Hosomichi
  51. Häkkerid ja kogukonnad
  52. IMKE
  53. IMKE WikiLab sandbox
  54. IT, Risks and Ergonomics
  55. IT, riskid ja ergonoomika
  56. IT ajalugu
  57. IT and Ethics
  58. IT eetika- ja õigusküsimused
  59. IT eetilised, sotsiaalsed ja professionaalsed aspektid 2016
  60. IT eetilised, sotsiaalsed ja professionaalsed aspektid 2017
  61. IT ja erivajadused
  62. IT juhtimine ja riskihaldus
  63. IT proff...?
  64. IT proff?
  65. IT turva- ja privaatsusküsimused
  66. Iaijutsu
  67. Information Society
  68. Information society?
  69. Infotehnoloogia eetilised, sotsiaalsed ja professionaalsed aspektid
  70. Infoühiskond
  71. Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus
  72. Intellectual property in the age of new media
  73. Intro: the author vs the information society
  74. Kama
  75. Kihon
  76. Kihon kumitachi (bokkeniga)
  77. Kogukonnad ja vaba kultuur
  78. Kono ha gaeshi
  79. Kote giri
  80. Kote kage
  81. Kote uchi
  82. Kote wari
  83. Kuidas vaba tarkvaraga äri tehakse
  84. Kumitachi
  85. Laulev revolutsioon
  86. Linux, hackers and the Free Culture
  87. Main Page
  88. Migi sode kage
  89. Migi yami uchi
  90. Mänglev tarkus: häkkerite lugu
  91. New media, Web 2.0, social software...
  92. Nobody's child - the problem with ordinary computer users
  93. Noppeid IT ajaloost
  94. Nuki kote
  95. Nunchaku
  96. Nunchaku 12-Kumite
  97. Nunchaku Kihon
  98. One Microsoft Way: the world of proprietary software
  99. Open Source management
  100. PIBKAC
  101. Playful Cleverness
  102. Political and social aspects of digital interactive media
  103. Practices, policies and user education
  104. Professionalism?
  105. Ransho
  106. Rengo
  107. Rid the fools of their money – the online world of crime and fraud
  108. SPEAIT
  109. SPEIT for EITC CyberSecurity curriculum
  110. Sai
  111. Sai kihon
  112. Sakugawa no sho (Sakugawa no kon sho)
  113. Security and Privacy in a Networked World/Cyberwars
  114. Security and Privacy in a Networked World/For introduction: broomsticks, hackers and crypto
  115. Security and Privacy in a Networked World/Networking
  116. Security and Privacy in a Networked World/No Tech Hacking
  117. Security and Privacy in a Networked World/Operating systems
  118. Security and Privacy in a Networked World/PIBKAC
  119. Security and Privacy in a Networked World/Privacy from different angles: Now and then
  120. Security and Privacy in a Networked World/Privacy from different angles: watching the watchmen
  121. Security and Privacy in a Networked World/Procedures: Thou shalt not...
  122. Security and Privacy in a Networked World/Programming in Python
  123. Security and Privacy in a Networked World/Social networks and social engineering
  124. Security and Privacy in a Networked World/Technology: A mighty knight with no pants
  125. Security and Privacy in a Networked World/The World of Malware
  126. Security and Privacy in a Networked World/Too easy to misuse
  127. Security and Privacy in a Networked World/Training: Herding cats
  128. Security and privacy issues
  129. Security policy
  130. Sekka gaeshi
  131. Shiho giri
  132. Shushi no dai
  133. Shushi no sho
  134. Singing revolution
  135. Sissejuhatus teemasse: erivajadused läbi aegade
  136. Software, software and software (and online content too)
  137. Software and Content Licensing
  138. Sotsiaalne tarkvara ja võrgukogukonnad
  139. Tarzan suurlinnas: võrgusuhtluse eripärad
  140. Tehnosuhtluse erialatutvustus
  141. Teistmoodi IT: erivajadused ja -lahendused
  142. Teistmoodi IT: ligipääsetavus ja puuetega kasutajad
  143. The Big Brother: privacy in the Internet Age
  144. The Big Brother on Menwith Hill
  145. The Dark Side and the Fool's Gold
  146. The Digital Divide
  147. The Empowerment: Different People, Digital World
  148. The Equalizer: assistive technology and people with disabilities
  149. The Hacker Ethic in a Networked World
  150. The Millennium Bug in the WIPO model
  151. The Orwellian Internet: online censorship
  152. The Playful Cleverness Reading List
  153. The Quirks of Online Communication
  154. The Story of Cyberspace
  155. The Story of Linux
  156. The Ubiquitous Computing and network society
  157. The Windows Special – viruses and other malware
  158. The broomstick at the door: security and privacy in different times
  159. The clash of motivations: different players in the field
  160. The content models: Creative Commons
  161. The hacker approach: the development of free licenses
  162. The history and development of copyright
  163. The long road: from ENIAC to iPad
  164. The networked world
  165. The proprietary world: WIPO and its ideas of intellectual property
  166. The rise and fall of intellectual property
  167. The security industry
  168. The uneasy alliance: Free Software vs Open Source
  169. The weird ways of online communication
  170. Tonfa
  171. Towards the information society
  172. Uus- ja sotsiaalmeedia
  173. Uus- ja sotsiaalmeedia Freenetist Snapchatini
  174. Vaba kultuur - tarkvarale järgnevad teised
  175. Vaba tarkvara
  176. Vaba tarkvara arendusprotsess ja selle eripärad
  177. Vaba tarkvara meetodid ja praktikad
  178. Vaba tarkvara meetodid ja praktikad 2
  179. Vaba tarkvara olemusest ja levikust
  180. Vaba tarkvara õiguslik taust
  181. Võitluskunstid
  182. Võrkude rikkus: vabast tarkvarast vaba kultuurini
  183. What about the future?
  184. Wireless freedom or ubiquitous nightmare?
  185. Yamabiko
  186. Yukidomari
  187. Üldterminite sõnastik

Näita (eelmised 250 | järgmised 250) (20 | 50 | 100 | 250 | 500)