Toggle navigation
Search
Collections
Indexes
FAQ
Digikogu
Search
Collections
Indexes
FAQ
Intranet
Logi sisse
Index: title
Securing a Semi-Attended Self-Service Kiosk Based on the Example of Services Offered by Apollo Digital
(1)
Securing Aesthetic Medicine Company Samleks OÜ by the ISO 27001 Standard
(1)
Securing Digital Government: Towards Governance Mechanisms for E-state Resilience
(1)
Securing Software Supply-Chain using OWASP Application Security Verification Standard: A SimplBooks Case Study
(1)
Securing the centralized logging system by the example of Elasticsearch
(1)
Securing the harmonization of the EU Law regarding the grants of survivor\s pensions to same-sex couples: a comparison between Finland and Poland
(1)
Securing the harmonization of the EU Law regarding the grants of survivor`s pensions to same-sex couples: a comparison between Finland and Poland
(1)
Securing Web Applications Built with Express.js
(1)
Securitization of Energy and Climate in Germany and Poland after Russian invasion to Ukraine
(1)
The Securitization of Immigration and Its Correlation with Terrorism
(1)
Security Analysis of Instant Messenger TorChat
(1)
Security Analysis of the Estonian I-Voting System Using Attack Tree Methodologies
(1)
Security Analysis of the Euro 2.0 Digital Currency Prototype
(1)
Security analysis of the web-based configuration process at the customer relationship management team of a bank
(1)
Security Analysis on Healthcare IoT Project
(1)
Security awareness training for home office users
(1)
Security Benefits for Agile Software Development
(1)
Security Considerations for Implementation of Blockchain in IoT Infrastructure
(1)
Security Evaluation and Testing of Software for Home Server
(1)
Security Information and Event Management Based on Opensource Tools
(1)
Security Investigation on the Taltech Smartlift
(1)
Security of loyalty cards used in Estonia
(1)
security of supply
(1)
Security of Supply – an important success factor of a company based on the example of AS Harju Elekter Elektrotehnika
(1)
Security Protocols Analysis in the Computational Model — Dependency Flow Graphs-Based Approach.Turvaprotokollide analüüs arvutuslikul mudelil — sõltuvusgraafidel põhinev lähenemisviis
(1)
items found: 40177
««
First
«
Previous
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
»
Next
»»
Last