Search

20328 results for: ‘%s’

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Causes you can support

    It's easy to ensure that your gift can be put to good use in an area you care about. See our range of projects and choose where you'd like your gift to go.

  • Complaints procedure

    Feedback and complaints procedure for the University Library

  • 28th October 2013 Sol 436

    Posted by jbridges in Mars Science Laboratory Blog on October 28, 2013 Today is a soliday on Mars and no science activities.  We are parked close to our next Waypoint called Cooperstown.

  • French

    Study French courses for all levels at The University of Leicester.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU