ID | Interpret | Skladba | Album | |
1. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
2. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
3. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
4. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
5. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
6. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
7. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
8. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
9. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
10. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
11. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
12. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
13. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
14. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
15. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
16. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
17. | IBM Rational software | Quality Management for Packaged Applications: Deploy your Enterprise Resource Planning (ERP) Applications with Confidence with Brian Bryson | IBM Rational software podcast series | |
18. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request | CERT's Podcasts for Business Leaders | |
19. | Dominic Frasca | Deviations | | |
20. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles | CERT's Podcasts for Business Leaders | |
21. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
22. | Binary Girl | Binary Girl - Binary Moss | The Resting Bench Remix Project - Volume 1 | |
23. | Binary Girl | Binary Girl - Binary Moss | The Resting Bench Remix Project - Volume 1 | |
24. | Yonder Mountain String Band | Fingerprint | The Meridian, Houston, TX 2/3/ | |
25. | Andrew Kay | Fingerprint 5 | Modern Chiptunes | |
26. | ben kamen and the hot new ringtones | the past and its fingerprint | live at the voyeur, november 29, 2007 | |
27. | Hieronymus Bosch | Fingerprint Labyrinth | Equivoke | |
28. | Business Intelligence Network | Defining the Economic Value for Business Intelligence Implementations in the Pharmaceutical Industry, Part 1 | Audio Article | |
29. | Edited by Douglas G. Greene | Detection by Gaslight | | |
30. | MU News Bureau | 12.16.05 Traffic Detection | Spotlight on Science | |