ID | Interpret | Skladba | Album | |
151. | CBC Radio: Words at Large | wordsatlarge 2007-11-21 | Words At Large podcast 83- GG Talent | |
152. | Storm Large & Rick Emerson | Radio Interview | Storm Large & Rick Emerson | |
153. | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | |
154. | House of Large Sizes | Bankrupt in Hoven | House of Large Sizes & Treepeople Split 7'' | |
155. | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | Storm Large on ntgradio.com w/Charmaine Brooks | |
156. | Monica Lam | Beyond VDI: Why Thin Client Computing and Virtual Desktop Infrastructures Aren't Cutting It | 22nd Large Installation System Administration Conference | |
157. | David Wagner | The State of Electronic Voting, 2008 | 22nd Large Installation System Administration Conference | |
158. | Dan Langille | Fighting Spam with pf | 22nd Large Installation System Administration Conference | |
159. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
160. | Sean Kamath | Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | 22nd Large Installation System Administration Conference | |
161. | Sean Kamath | Inside DreamWorks Animation Studios: A Look at Past, Present, and Future Challenges | 22nd Large Installation System Administration Conference | |
162. | James Hughes | OpenSolaris and the Direction of Future Operating Systems | 22nd Large Installation System Administration Conference | |
163. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
164. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
165. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
166. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
167. | Abhinav Pathak and Y. Charlie Hu, Purdue University; Z. Morley Mao, University of Michigan | Peeking into Spammer Behavior from a Unique Vantage Point | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
168. | Aaron J. Burstein, University of California, Berkeley, School of Law | Conducting Cybersecurity Research Legally and Ethically | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
169. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
170. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
171. | D. Kevin McGrath and Minaxi Gupta, Indiana University, Bloomington | Behind Phishing: An Examination of Phisher Modi Operandi | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
172. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
173. | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, and Stefan Savage, University of California, San Diego | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
174. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
175. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
176. | Carson Gaspar | Deploying Nagios in a Large Enterprise Environment | 21st Large Installation System Administration Conference Invited Talks | |
177. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
178. | Guido Trotter | Ganeti: An Open Source Multi-Node HA Cluster Based on Xen | 21st Large Installation System Administration Conference Invited Talks | |
179. | Alexander Muentz | Hardening Your Systems Against Litigation | 21st Large Installation System Administration Conference Invited Talks | |
180. | Alok Tongaonkar | Inferring Higher Level Policies from Firewall Rules | 21st Large Installation System Administration Conference Refereed Papers | |