Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Krüptoraha on tõusuteel. Nüüd on just õige aeg osta! Ära riski ja kauple turvalises keskonnas -> TEE KONTO Sulge
Facebook Like
Add link

"vulnerability" - 31 õppematerjali

9
rtf

Andmeturve ja viirusekaitse

Üldosa Millest räägime?? 1. Infoturbe põhimõisted 2. Riskianalüüs, riskianalüüsi meetodid 3. Viirused ja viirusekaitse 4. Turvameetmed 5. Volitustõendid 6. Krüptograafia 7. Digitaalallkiri ja selle kasutamine...

Arvutiõpetus - Kutsekool
133 allalaadimist
2
doc

Hemingway A Farewell to Arms (main characters)

The reader understands why Henry responds to the game that Catherine proposes--why he pledges his love to a woman he barely knows: like Rinaldi, he hopes for a night's simple pleasures. But an active sex drive does not explain why Henry returns to Catherine--why he continues to swear his love even after Catherine insists that he stop playing. In his fondness for Catherine, Henry reveals a vulnerability usually hidden by his stoicism and masculinity. The quality of the language that Henry uses to describe Catherine's hair and her presence in bed testifies to the genuine depth of his feelings for her. Furthermore, because he allows Henry to narrate the book, Hemingway is able to suffuse the entire novel with the power and pathos of an elegy: A Farewell to Arms, which Henry narrates after Catherine's death, confirms his love and his loss...

Tekstistruktuur (inglise) - Tallinna Ülikool
38 allalaadimist
120
doc

Lühendite seletus

OUT Outlines (file name extension) OUTS Output String OV Overflow OVAL Object-Based Virtual Application Language [Psion] + Open Vulnerability Assessment Language [US-CERT] .OVL Program Overlay (file name extension) .OVR Program Overlay (file name extension) OWA Outlook Web Access [Microsoft] OWL ObjectOpen Windows Library [Borland] P... | TOP | UP to O | DN to Q | BOTTOM | P3P Platform for Privacy Preferences Project PAB Personal Address Book PABX Private Automatic Branch Exchange PACE Priority Access Control Enabled [3Com] PACS Picture Archiving and...

Informaatika - Kutsekool
101 allalaadimist
19
ppt

Andmeturve üldosa

Andmeturve Üldosa Millest räägime? Infoturbe põhimõisted Riskianalüüs, riskianalüüsi meetodid Turvameetmed Volitustõendid Krüptograafia Digitaalallkiri ja selle kasutamine Sügis 2006 Tallinna Polütehnikum 2 Kirjandus V. Hanson. Infosüsteemide turve. 1. osa: turvarisk. Tallinn, AS Cybernetika V. Hanson, A. Buldas, H. Lipmaa Infosüsteemide turve. 2. osa: turbe t...

Arvutiõpetus - Kutsekool
79 allalaadimist
91
doc

VA dokumendi- ja arhiivihalduse kriisireguleerimise analüüs

Tallinna Ülikool Infoteaduste Instituut Mari Hõbemäe Valitsusasutuste dokumendi- ja arhiivihalduse kriisireguleerimise analüüs Magistritöö Juhendajad: Kädi Riismaa Ingrid Raidme 2 Tallinn 2008 ...

Allika?petus -
85 allalaadimist
56
doc

Sotsiaalpsühholoogia

SP maastik: eneseteadvus ja identiteet, sotsiaalne taju ja hoiakud, inimestevahelised suhted ja sotsiaalne mõju, suhtlemine, grupid ja grupiprotsessid Sotsiaalpsühholoogiat huvitab inimvaheliste suhete maailma Gordon Allport (1954): "Social psychology is an attempt to understand and explain how t...

Sotsiaalpsühholoogia - Tallinna Ülikool
574 allalaadimist
8
ppt

Addictions

Drug addiction Drug addiction is widely considered a pathological state. The disorder of addiction involves the progression of acute drug use to the development of drug-seeking behavior, the vulnerability to relapse, and the decreased, slowed ability to respond to naturally rewarding stimuli. Video game addiction Video game addiction, or more broadly video game overuse, is excessive or compulsive use of computer and video games that interferes with daily life. Instances have been reported in which users play compulsively, isolating themselves from, or from other forms of, social contact and fo...

Inglise keel - Keskkool
10 allalaadimist
30
docx

Sotsiaalpsühholoogia loengu konspekt

Sotsiaalpsühholoogia Õppejõud: Mati Heidmets Slaidid, kursuseprogramm: yldbak Adler284 Moodle: parool sp2011 Eksam Moodle'is 12., 21. ja 34. nädalal, valikvastustega test http://www.socialpsychology.org/ Sotsiaalpsühholoogia kui inimestevaheliste suhete ruumi analüüsiv, siin ilmnevaid seaduspärasusi välja toov teadus Sotsiaalpsühholo...

Sotsiaalpsühholoogia - Tallinna Ülikool
409 allalaadimist
4
pdf

Infosüsteemi varad

2 Infosüsteemi varad Turvaprobleemid tekivad kõikjal, kus kellegi omanduses või käsutuses on varasid -- materiaalseid või intellektuaalseid ressursse, millel on mingi, enamasti rahas väljendatav väärtus. Infosüsteem on standardi ISO 2382 määratluses informatsiooni andev ja jaotav infotöötlussüsteem koos juurdekuuluvate organisatsiooniliste ressurssidega, sealhulgas inim-, tehniliste ja rahaliste ress...

Andmeturbe alused - Kutsekool
33 allalaadimist
3
doc

Tööstuslik andmeside kontrolltöö 2 abimaterjal - vastused

oData transparency: In bit and byte oriented protocols, there is a problem if a control character (for ETX (End of Text) ·Same as ETB, only no more blocks will follow. ITB (End of > Differences with HDLC ­ length of protocol field (1B or 2B) byte-oriented protocols) or the start-of-frame flag (for bit-oriented protocols) appears i...

Tööstuslik andmeside - Tallinna Tehnikaülikool
28 allalaadimist
52
docx

Sissejuhatus infosüsteemidesse kontrolltöö teooria

Infosüsteemide (IS) valdkond (IS valdkonna spetsialisti teadmised) Infosüsteemide valdkond Tegeleb kõigega, mis on seotud inimvõimete suurendamisega infotehnoloogia abil ja see puudutab: · probleemide lahendamist · otsuste vastuvõtmist · vajalike tegevuste sooritamist · arusaamise/mõistmise loomist Täpsemalt tegeletakse probleemidega, mis on seotud infotehnoloogiliste ressursside ja te...

Sissejuhatus... - Tallinna Tehnikaülikool
312 allalaadimist
163
rtf

Dey Bared to You RuLit Net

"You're wet for me," he murmured, his gaze sliding down my body to where he was parting me with his fingers. "You're beautiful here, too. Plush and pink. So soft. You didn't wax today, did you?" I shook my head. "Thank God. I don't think I would've made it ten minutes without touching you, let alone ten hours." He slid one finger carefully into me. My eyes closed against the unbearable vulnerability of being spread out naked and fingered by a man whose familiarity with the rules of Brazilian waxing betrayed an intimate knowledge of women. A man who was still fully clothed and kneeling on the floor beside me. "You're so snug." Gideon pulled out and thrust gently back into me. My back bowed as I clenched eagerly around him. "And so greedy. How long has it been since the last time you were fucked?" I swallowed hard. "I'...

Inglise teaduskeel - Tallinna Tehnikaülikool
12 allalaadimist
25
pdf

Individuaalsete erinevuste psühholoogia

SISSEJUHATUS - Kenn Konstabel · Psühholoogia bakalaureuse programm, 1991: kaks psühholoogiavaldkonda, mis käsitlevad individuaalseid erinevusi ­ isiksus ja intelligentsus (vaimsed võimed) · Vanaaegne nimetus: diferentsiaalpsühholoogia · Kuid tuleb arvestada ka, et (a) individuaalsed erinevused on olulised [ja järjest olulisemad] ka teistes psühholoogiavaldkondades, ja (b) ükski tõsine teadus ei saa...

Enesejuhtimine - Tallinna Tehnikaülikool
181 allalaadimist
164
docx

Challenges of childrens participation A Case Study of active citizenship in Cadle Primary School

44); Morrow, pp. 149-151; Young Children`s Citizenship, ed. By Bren Neale (York: Joseph Rowntree Foundation, 2004), pp. 6-7; Alderson, p. 131; Howe and Covell, p. 57; Children`s Childhoods Observed and Experienced, pp.36-37; Morrow, pp.149-151). 9 relates children with innocence and vulnerability often `constructs children out of society, mutes their voices, denies their personhood, and limits their potential` 26. Children are not citizens in a constitutional sense, they cannot vote. They are perceived as `presocial` actors `trapped in the state of becoming rather than being`.27 Thereupon, children are not considered of being rational and capable of exercising responsibility until the age of majority, the age of 18. 28 There is...

Inglise keel -
6 allalaadimist
18
pptx

Küberkaitse

The 2006 Riga summit listed possible cyber attacks among the asymmetric threats to the common security and acknowledged the need for programs to protect information systems over the long term. The cyber attacks on Estonia in 2007 highlighted for the first time the potential vulnerability of any NATO countries, their institutions and societies, and even NATO itself to disruption or penetration of their information and communications systems. • Estonia’s proposals for a NATO cyber excellence center received strong support from the alliance’s Secretary-General "Jaap" de Hoop Scheffer. NATO completed an assessment of the situation, partly in light of Estonia’s experience, in April 2007, and approved a N...

Ühiskonnaõpetus - Keskkool
9 allalaadimist
10
docx

Andmeturbe mõisted

Andmete konfidentsiaalsus (confidentiality) ehk salastatus on andmete kättesaadavus ainult sellega seotud subjekidele. Andmete terviklikus (integrity) tähendab andmete pärinemist autentsest allikast ning veendumist, et andmeid pole hiljem volitamatult muudetud nii tahtliku tegevuse tulemusena või ka tahtmatult. Haavatavus (vulnerability) on mingi süsteemi (nt sotsiaalse või ökosüsteemi) tõenäolise kahjustumise määr ebasoodsate mõjurite tõttu [ Oht (threat) on olukord, kus kedagimidagi ähvardab nt õnnetus (õnnetuseoht), katastroof (katastroofioht)[1]; nende võimalus ja tõenäosus[1] (sellises tähenduses langeb see kokku mitmetähendusliku termini "risk" ühe tähendusega). Ründetarkvara on programm, mis kujutab endast ohtu turvalisusele või privaatsuse...

Andmeturbe alused - Kutsekool
30 allalaadimist
8
docx

Tehnilise dokumentatsiooni küsimused

Igasugust intsidentide potentsiaalset põhjust tuleb käsitleda ohuna. Näiteks elektrikatkestus on oht, mis võib ära kasutada elektrisüsteemi poolt tekitatudhaavatavuse.Iga oht on määratud tasemega, mis näitab võimalikku sündmuse esinemissagedust (statistika baasil). Seda taset kasutatakse riskide hindamisel. 3. Mis on haavatavus?  Haavatavus (Vulnerability) - nõrkus, mida oht võib ära kasutada. Näiteks avatud tulemüüri port või piisava jahutussüsteemita serveriruum. Puuduv meede kvalifitseeritakse samuti haavatavuseks. 4. Mis on vara?  Vara (Asset)-teenuseosutaja varad sisaldavad kõike, midasaab kasutada teenuste osutamiseks nagu juhtimine,organisatsioon, protsess, teadmised, inimesed, informatsioon, rakendused,infrastruktuur ja finantskapital. 5. Mis on...

Tehnikaajalugu - Kutsekool
10 allalaadimist
6
pdf

Myers, Kitsuse 2000 Constracting the Future in Planning

One emphasis that has been identified as central to the intellectual and professional identity or mission of planning is “foresight” (Markusen 1998), “a focus on the future and pathways of change over time” (Strategic Marketing Committee of ACSP 1997), or “persuasive storytelling about the future” A Surprising Neglect (hüljatud). “....planning has lost sight of the future....Planning voluntarily is sacrificing its role...

Inglise keel - Tallinna Tehnikaülikool
4 allalaadimist
946
pdf

TheCodeBreakers

Riverbank Publication No. 22, written in 1920 when Friedman was 28, must be regarded as the most important single publication in cryptology. It took the science into a new world. Entitled The Index of Coincidence and Its Applications in Cryptography, it described the solution of two complicated cipher systems. Friedman, however, was less interested in proving their vulnerability than he was in using them as a vehicle for new methods of cryptanalysis. In it, Friedman devised two new techniques. One was brilliant. It permitted him to reconstruct a primary cipher alphabet without having to guess at a single plaintext letter. But the other was profound. For the first time in cryptology, Friedman treated a frequency distribution as an entity, as a curve whose several points were causally related, not as just...

krüptograafia -
12 allalaadimist
548
pdf

Cialdini raamat

Perhaps that is so precisely because of the mechanistic, unthinking manner in which they occur. Whatever the reason, it is vital that we clearly recognize one of their properties. They make us terribly vulnerable to anyone who does know how they work. To understand fully the nature of our vulnerability , let us take another glance at the work of the ethologists. It turns out that these animal behaviorists with their recorded cheep-cheeps and their clumps of colored breast feathers are not the only ones who have discovered how to activate the behavior tapes of various species. One group of organisms, often termed mimics, copy the trigger features of other animals in an attempt to trick these animals into mistakenly playing the right be-...

Psühholoogia -
19 allalaadimist


Registreeri ja saadame uutele kasutajatele
faili e-mailile TASUTA

Konto olemas? Logi sisse

Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun