Search alternatives:
security information » city information (Expand search)
information program » formation program (Expand search), informatic program (Expand search), informative program (Expand search)
coder security » cyber security (Expand search), power security (Expand search), ciber security (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
security information » city information (Expand search)
information program » formation program (Expand search), informatic program (Expand search), informative program (Expand search)
coder security » cyber security (Expand search), power security (Expand search), ciber security (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
10
11
12
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
13
14
15
Comparação da COBIT Security Baseline e do ISO 17799: 2000 para a produção da lista de requisitos...
Subjects:
“...Information Systems Security Program...”Access document
Master thesis
16
17
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
18
19
“... if Information Flow Control (IFC), a security technique used for discovering leaks in software, could be used...”
Access document
Access document
Master thesis
20