Search

10824 results for: ‘JAVA JSP在线问诊系统 医患交流系统-毕业设计 课程设计✅项目合作 二开均可 TG:saolei44✅.vobLtzxRbCe’

  • Mobile and Web Applications

    Module code: CO7102 In this module we will explore the architectural foundations for web technologies and use XML based techniques appropriately to create documents and handle data. We will also: Solve security and session handling issues and use supporting techniques.

  • Mobile and Web Applications

    Module code: CO7102 In this module we will explore the architectural foundations for web technologies and use XML based techniques appropriately to create documents and handle data. We will also: Solve security and session handling issues and use supporting techniques.

  • Mobile and Web Applications

    Module code: CO3102 In this module we will explore the architectural foundations for web technologies and use XML based techniques appropriately to create documents and handle data. We will also: Solve security and session handling issues and use supporting techniques.

  • Professor Effie Law

    Professor Effie Law, Professor in Human-Computer Interaction is pioneering exciting, interesting and informative ways to use video games in education.

  • Student projects

    Find out about how students in the Department of Informatics at the University of Leicester can aid external clients on projects, providing a unique opportunity for companies to access the expertise of students and staff while getting some real work done.

  • Expedition 320T: Seatrials

    20 January – 5 March 2009 Expedition 320T started in January 2009 and tested all of the scientific and technical equipment on board the JOIDES Resolution following its time in dry dock.

  • Resources

    Useful resources for higher education on gene expression and regulation.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU