Search alternatives:
security programming » secure programming (Expand search), security program (Expand search), security programs (Expand search)
framework security » framework electricity (Expand search)
coder framework » modern framework (Expand search), model framework (Expand search), order framework (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
security programming » secure programming (Expand search), security program (Expand search), security programs (Expand search)
framework security » framework electricity (Expand search)
coder framework » modern framework (Expand search), model framework (Expand search), order framework (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
10
11
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
12
13
14
“... consequences for its users. An example of a serious failure was the case Apple iCloud security exploit in 2014...”
Access document
Access document
Master thesis
15
16
17
18
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
19
“... simultaneously with same code base, while assuring that the expectations of the final user are fulfilled. Because...”
Access document
Access document
Master thesis
20