Search alternatives:
testing security » using security (Expand search), things security (Expand search), banking security (Expand search)
security program » security process (Expand search)
coder testing » model testing (Expand search), mode testing (Expand search), cancer testing (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
testing security » using security (Expand search), things security (Expand search), banking security (Expand search)
security program » security process (Expand search)
coder testing » model testing (Expand search), mode testing (Expand search), cancer testing (Expand search)
python coding » python codigo (Expand search), action coding (Expand search), python code (Expand search)
coding python » codigo python (Expand search), codigos python (Expand search), using python (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
5
“... consequences for its users. An example of a serious failure was the case Apple iCloud security exploit in 2014...”
Access document
Access document
Master thesis
6
7
8
9
10
11
“...Este trabalho investiga criticamente a prática do live coding, uma arte performática que envolve...”
Access document
Access document
Bachelor thesis
12
13
“... quality control, security, robustness, and reliability; the most widely known are Software Testing and...”
Access document
Access document
Doctoral thesis
14
“... to insights and bridge communication between life scientists and computer scientists. Python is a programming...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
15
16
17
18
19
20