Listing results for the department Computer Science: |
![]() ![]() |
Total number of hits is 1523, and record(s) 561 to 580 are: |
561. Introduction to data structures and algorithms![]() ![]() ![]() |
562. Computer and network security![]() ![]() ![]() |
563. Reverse engineering and malware analysis![]() ![]() ![]() ![]() |
564. Functional programming![]() ![]() ![]() |
565. Analysis and design of enterprise applications in UML![]() ![]() ![]() ![]() |
566. Probabilistic Method and Randomized Algorithms![]() ![]() ![]() |
567. E-commerce technologies (Restricted access; Contact your lecturer)![]() ![]() ![]() ![]() ![]() |
568. Object-oriented programming and Java (Restricted access; Contact your lecturer)![]() ![]() ![]() ![]() |
569. Smart phone apps development![]() ![]() COMP7506B ![]() ![]() |
570. Introduction to financial computing![]() ![]() ![]() ![]() |
571. Electronic commerce technology![]() ![]() ![]() |
572. Securities transaction banking![]() ![]() ![]() ![]() |
573. Semantic data architecture (Restricted access; Contact your lecturer)![]() ![]() ![]() ![]() ![]() |
574. Image processing and computer vision (supplementary paper)![]() ![]() ![]() ![]() |
575. Information security: attacks and defense (supplementary paper)![]() ![]() ![]() ![]() |
576. Introduction to software engineering (Restricted access; Contact your lecturer)![]() ![]() ![]() ![]() |
577. From Human Vision to Machine Vision![]() ![]() ![]() |
578. Compiling techniques![]() ![]() ![]() |
579. Programming technologies and tools (Restricted access; Contact your lecturer)![]() ![]() ![]() ![]() |
580. Computer and communication networks (Restricted access; Contact your lecturer)![]() ![]() ![]() ![]() |
![]() ![]() |