Candlelight concerts bring the magic of a live, multi-sensory musical experience like never seen before. Discover the music ...
Network and communications security is an important part of information security: a large portion of IT-related attacks are performed either using network connections or are directed at network ...
The course will provide knowledge in different uses of parallelism in a multi-core computer and especially provide insight into how and when Java can be used to develop parallel programs which can be ...
The course covers methods for analysis of digital signals in noise. Examples of topics are description of stochastic signals in time and frequency domain, modeling of signals, estimation, detection, ...
This course gives a broad introduction in, and overview of, the field of Design for sustainability. It addresses the main developments in the field, from Green Design to holistic approaches, such as ...
This course provides an overview of a range of resources and practical bioinformatic tools that are used in molecular biology. Scientists actively developing and applying bioinformatic tools in their ...
This is a broad-based survey course which gives an introduction to British history, culture and present-day British society. It has two main components, one historical and one contemporary. The ...
This course is a continuation of high school calculus, but goes deeper into the theoretical foundations and develops the methods further in order to deal with more complicated cases. The course also ...
This course addresses different ways of thinking about the relationship between development and human rights, and addresses critical contemporary issues as global and local poverty, national and ...
Security by Design means that security is integrated in the entire development lifecycle of IT systems, including programming, testing, deployment, configuration and operation. This course teaches how ...
Ethical hacking covers vulnerability and penetration testing, which are essential elements in modern cybersecurity. Ethical hacking consists of testing the security of IT systems by trying to find and ...
Explore the world of reflection-seismic data. This course is designed to equip you with both theoretical knowledge and practical skills. We begin by reviewing the basic principles of the seismic ...