Download PDF: http://ikuz.eu/wp-content/uploads/2017/06/minesweeper1.pdfSource code: http://ikuz.eu/wp-content/uploads/2017/06/minesweeper1.zip
Download PDFshttp://ikuz.eu/wp-content/uploads/2017/06/sheet7.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/crypto2ex4.5.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/exercise_sheet_2.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/sheet5.pdf
Download PDFs:http://ikuz.eu/wp-content/uploads/2017/06/Cryptographic-protocols-exercise1.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Cryptographic-protocols-exercise2.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Cryptographic-protocols-exercise3.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Cryptographic-protocols-exercise4.pdf
Download PDFshttp://ikuz.eu/wp-content/uploads/2017/06/Complexity-Theory-Lecture-1.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Complexity-Theory-Lecture-3.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Complexity-Theory-Lecture-12.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Complexity-Theory-Lecture-13.pdf
Download PDF: http://ikuz.eu/wp-content/uploads/2017/06/SQL-injection-vulnerability-in-CMS-Drupal.pdf
Download PDFs:http://ikuz.eu/wp-content/uploads/2017/06/Breaking-Substitution-Cipher-Using-Genetic-Algorithm-Poster.pdfhttp://ikuz.eu/wp-content/uploads/2017/06/Breaking-Substitution-Cipher-Using-Genetic-Algorithm-Article-Review.pdf
Download PDF: http://ikuz.eu/materials/homeworks/db-theory-course-project.pdf