Search alternatives:
security programming » secure programming (Expand search), security program (Expand search), security programs (Expand search)
services security » services survey (Expand search)
coder services » modern services (Expand search), over services (Expand search), power services (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
security programming » secure programming (Expand search), security program (Expand search), security programs (Expand search)
services security » services survey (Expand search)
coder services » modern services (Expand search), over services (Expand search), power services (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
“... consequences for its users. An example of a serious failure was the case Apple iCloud security exploit in 2014...”
Access document
Access document
Master thesis
15
16
17
18
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
19
20