121 |
Museum of Chinese Science and TechnologyCheung, Chi-wai, 張志偉 January 1996 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
|
122 |
Heritage Institute of Hong KongYing, Lai-chu, Veronica., 應麗珠. January 1998 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
|
123 |
The Environment Protection CentreMak, Tak-hing., 麥德興. January 1997 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
|
124 |
Boy scout New Territories regional headquartersLo, Ping-hang., 盧秉恆. January 1997 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
|
125 |
Hong Kong Life Science MuseumLam, Hoe-chung., 林浩沖. January 1997 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
|
126 |
Landscape proposals for Wu Kai Sha Youth Camp redevelopment schemeTsang, Hang-lun., 增杏倫. January 1995 (has links)
published_or_final_version / Architecture / Master / Master of Landscape Architecture
|
127 |
Children Art CentreKwok, Lai-yip, Jerry., 郭禮業. January 1999 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
|
128 |
Planning considerations and requirements for underground development : case study of Tsim Sha Tsui underground commercial development /Law, King-wai. January 1994 (has links)
Thesis (M. Sc. (Urb. Plan.))--University of Hong Kong, 1994. / Includes bibliographical references.
|
129 |
Need assessment for relocation of Cheung Sha Wan Abattoir /Lau, Chi-yung. January 1992 (has links)
Thesis (M. Sc.)--University of Hong Kong, 1992.
|
130 |
Webové aplikace pro autentizaci uživatelů / Web applications for user authenticationVybíral, Petr January 2014 (has links)
The thesis deals with the problems of user authentication. The first chapter analyzes the problem of authentication, its methods and its utilization. The second chapter presents the different security options for communication. The chapter describes security, communication and authentication protocols. There is the 2D barcode QR Code described at the end of the chapter. The third chapter is devoted to ASP.NET technology, its development and possibilities of utilization. Attention is focused on web form and server controls. There is an analysis of elements of cookies and possibilities of their use. The last chapter consists of a practical part, which describes the development of a web application. There is a description of the parts of application, such as the database, the Web navigation, master pages and etc. in the following chapter. The cardinal part of the chapter consists of an analysis and implementation of forms authentication, the attribute authentication and authentication with QR code. Finally, there is a description of way how to secure the communication by using a certificate.
|
Page generated in 0.0292 seconds