ID | Interpret | Skladba | Album | |
1. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
2. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
3. | Baldwin Ng | TechNet Webcast: Using Windows Vista Hardware Assessment to Determine the Capabilities of Your Organizations Computer Hardware | | |
4. | Fatal Recoil | Malicious | Malicious | |
5. | ��������� �������� - Malicious doll | ��������� �������� - Malicious doll | | |
6. | CHASTAIN | Malicious Pigs | In An Outrage | |
7. | ��������� �������� - Malicious doll | ��������� �������� - Malicious doll | | |
8. | Marc Bell | The last sound [feat. Malicious] | Outstanding Effort | |
9. | BLACK WOOD | Malicious Pest Of Satan From The Crypt | For The Mankind Grief Reunited | |
10. | Marc Bell | Gimme some mort [feat. Malicious] | Outstanding Effort | |
11. | BLACK WOOD | Malicious Pest Of Satan From The Crypt | For The Mankind Grief Reunited | |
12. | Marc Bell | Gimme some mort [feat. Malicious] | Outstanding Effort | |
13. | Ian & Nina Fry | Implementing CDG Curriculum in Your Church | 2007 Children Desiring God Conference | |
14. | WCC Genesys North America | Effective Strategies for Implementing HR BPO | | |
15. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
16. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
17. | Web Standards Group London | Jeremy Keith: Implementing Microformats | Web Standards Group London | |
18. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
19. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
20. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
21. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
22. | PGP Corporation | Colleen Ebel on Implementing Encryption | PGP® Security Podcasts | |
23. | CBS | Designing Women | Must Hear TV - Cacophony | |
24. | Christopher Schmitt, Eric Ellis and Kimberly Blessing | Designing Our Way Through Web Forms | SXSWi 2009 | |
25. | Craig Shoemaker | Implementing MVVM and Exploring UX Design Patterns | Pixel8 :: http://getpixel8ed.com/ | |
26. | Harold Boeck | RFIDRadio-016 - Implementing RFID in a store quickly | RFID Radio | |
27. | Harold Boeck | RFIDRadio-013 - Implementing RFID in the Retail Industry | RFID Radio | |
28. | Antony Gormley; Professor Richard Sennett; Neven Sidor | Designing Spaces for Thought | LSE: Public lectures and events | |
29. | Earthwatch Radio | Designing a Cancer Cure | Earthwatch Radio series | |
30. | Moderator: Alissa Walker, Gelatobaby; John Slabyk , Obama - SimpleScott; Alissa Walker, Gelatobaby | Designing Change in America | SXSW Interactive 2009 | |