Special

Digital security for Women, Bosnia Gender and tech tutorials used


  • Gender Tech Herstory Exhibition
  • Gender Tech Personal Memories
  • Hands On How the internet works
  • Hands On Understanding the group – Spectrogram
  • Holistic Security - Demonstrating the interconnectedness
  • Holistic security - A day in your life
  • Threat analysis - Information Mapping I
  • Threat analysis - Information Mapping II

 

From page     Property