Search alternatives:
security program » security process (Expand search)
server security » services security (Expand search), curve security (Expand search), gender security (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder server » modern server (Expand search), router server (Expand search), soccer server (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
security program » security process (Expand search)
server security » services security (Expand search), curve security (Expand search), gender security (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder server » modern server (Expand search), router server (Expand search), soccer server (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
“..., such as the voter's computer and the Internet infrastructure connecting it to the election server...”
Access document
Access document
Article
5
6
7
8
9
10
11
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
12
13
“... consequences for its users. An example of a serious failure was the case Apple iCloud security exploit in 2014...”
Access document
Access document
Master thesis
14
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
15
16
“... Reform) in the field of security measures. Based on successful experiences, such as the Program...”
Access document
Access document
Article
17
18
19
20