ID | Interpret | Skladba | Album | |
61. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
62. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
63. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
64. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
65. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
66. | Bowdoin College | Bowdoin Franco American Symposium - November 13 | Bowdoin Franco American Symposium | |
67. | Bowdoin College | Bowdoin Franco American Symposium - November 14 | Bowdoin Franco American Symposium | |
68. | Bowdoin College | Bowdoin Franco American Symposium - November 15 | Bowdoin Franco American Symposium | |
69. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
70. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
71. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
72. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
73. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
74. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
75. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
76. | DJ Edit | Confessions of a mash-up un-artist | NMC Online Symposium, April 2, 2008 | |
77. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
78. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
79. | Calvin Institute of Christian Worship | Worship Renewal in a Context | Calvin Symposium on Worship 2009 | |
80. | Calvin Institute of Christian Worship | Worship Renewal in a Context | Calvin Symposium on Worship 2009 | |
81. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
82. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
83. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
84. | Steve Dovers | Beyond the barbed wire fence is a foreign country: thinking and managing across tenures | Place and Purpose Symposium 2009 | |
85. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
86. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
87. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
88. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
89. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
90. | Calvin Institute of Christian Worship | Vertical Habits: Practical Wisdom for Teaching Worship - panel hosted by Betty Grit | Calvin Symposium on Worship 2008 | |