Search

8852 results for: ‘毕设ssm584网上挂号系统 jsp毕业设计✅项目合作 二开均可 TG:saolei44✅.ElkMptrjqLVZmpZ’

  • Parents, carers and families

    Get more information for parents, carers and families of students applying to the University of Leicester.

  • Brussels Street Lamp Museum

    A blog post from the School of Museum Studies at the University of Leicester about the Brussels Street Lamp Museum

  • Listening to Winnifred

    A description of the discovery and contents of taped interviews with people known to Evelyn Waugh, conducted by Dr Winnifred Bogaards

  • Ripple: Publication of the Students’ Union

    Posted by Ceri Ashwell in Library Special Collections on January 29, 2014 Front cover 1952 Welcome to our first blog post! The aim of the blog is to expand awareness of the items within our collection and of the resources we have available.

  • Cartooning: A Delicate Art Form that Needs to be Preserved

    Political cartoonist Michel Kichka (Israel) is interviewed by Shout Out UK Young Writer William Speakman.

  • Law (JD Pathway) LLB

    Leicester Law School is home to more Canadian students than anywhere else in the UK. View our Juris Doctor JD Pathway entry requirements.

  • Employability and careers

    Our programme has been designed and recognised for its innovative approach to employability, winning the Embedding Employability element of the UK Collaborative Award for Teaching Excellence in 2017.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

  • R for Data Science

    Module code: GY4472 In this module you will focus on the programming language R as an effective tool for data science.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU