Most Viewed

Total count: 7276
Cybermenaces - 21/05/2013 - Table-Ronde 1
Cyber espionnage, fuite d'information, vol et destruction de données, manipulation, e- reputation : quelles sont les menaces ? Comment opèrent les att...
Created on 26 May, 2013by IlEstUneFois
Time: 01:22:01
Slides: 44
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
What do you do?
Presentación sobre rutinas en inglés de 2º A
Created on 01 February, 2013by Pepa99
Time: 00:00:57
Slides: 15
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
Buscar trabajo en internet
Una guía completa y gratuita que te ayudará a buscar y encontrar trabajo en internet.
Created on 28 November, 2012by midium
Time: 00:04:30
Slides: 90
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
Created on 07 January, 2010by michaellui11
Time: 00:00:30
Slides: 0
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
Introducing the Extreme Wave & Green Water Loading Computational Tool
Cranfield University in the UK have developed a unique technique and software programme which uses a Coupled Finite Element–Smooth Particle Hydrodynam...
Created on 25 June, 2009by cranfieldeng
Time: 00:00:42
Slides: 7
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
崖の上のポニョ
Ponyo on the Cliff by the Sea
Created on 22 January, 2009by linux_lover
Time: 00:02:57
Slides: 0
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 1
Created on 22 September, 2007by mac
Time: 00:00:50
Slides: 10
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
Created on 25 August, 2007by mac
Time: 00:05:05
Slides: 11
Views: 295 | Comments: 0 | Favorited: 0 | Rating: 0
Configuraciones del Sw
En este capítulo se abordan conceptos fundamentales sobre la configuración básica del Sw, especialmente en lo referente a la administración segura (SS...
Created on 03 May, 2018by miltiniorc
Time: 00:09:50
Slides: 59
Views: 294 | Comments: 0 | Favorited: 0 | Rating: 0
El Patrimonio
El Patrimonio
Created on 10 March, 2017by angelaexposito
Time: 00:05:00
Slides: 11
Views: 294 | Comments: 0 | Favorited: 0 | Rating: 0

Clear Trace