Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
security computing » security completing, security combating, security composing
program security » program series, process security, program section
function python » function protein, function section, function persons
python program » python programs, action program, python programming
https » http
security computing » security completing, security combating, security composing
program security » program series, process security, program section
function python » function protein, function section, function persons
python program » python programs, action program, python programming
https » http
1
2
Published 2015
Table of Contents:
“...-To-End Authentication for Mobile Banking -- Improving Mutation Testing Process of Python Programs -- Task...”View full text
Electronic
eBook
3
by Al-Saadi, Mustafa Yahya Zakariya
Published 2018
Subjects:
“...Software-defined networking (Computer network technology)...”Published 2018
View full text
Thesis
4
Table of Contents:
“... -- Developing Functions and Stored Procedures in DB2 -- Controlling Access to DB2 -- Securing Data in DB2...”
View full text
View full text
Electronic
eBook
5
by Al-Saadi, Mustafa Yahya Zakariya
Published 2018
“... was written in
Python programming language to be implementing on a POX controller.
To find the proper...”Published 2018
View full text
Thesis



