ID | Interpret | Skladba | Album | |
121. | David Jackson | SOP122 Evo Terra Author of Expert Podcasting Practices for Dummies | The Morning Announcements | |
122. | Edwin Yuen; Ben Bolles | TechNet Webcast Audio: Storage Best Practices for Virtual Server | | |
123. | HumaniTech Panel | Serious Play: The Practices of Everyday Life in Video Games and Virtual Worlds | | |
124. | Joseph Truncale, President and CEO of NAPL and leading printers | NAPL TMC Update Podcast #6: Panel of Leading Printers Discusses Best Practices | NAPL Top Management Conference Podcasts | |
125. | Dustin; Ty; Heather - Webcast Team | TechNet Webcast Audio: Best Practices for Deploying System Center Essentials | | |
126. | Interwoven's GearUp Podcast | Session Preview: Multivariable Optimization Best Practices for Maximizing Visitor Engagement on Your Website | podcast@interwoven.com | |
127. | CMC Media | CM Today Includes Computerworld Announces Finalists for the 2007 Best Practices in Business Intelligence | | |
128. | CMC Media | CM Today Includes Computerworld Announces Finalists for the 2007 "Best Practices in Business Intelligence" | | |
129. | Alain Daboncourt | Introduction et Variations - Introduction | L'Europe Preromantique | |
130. | Alain Daboncourt | Introduction et Variations - Introduction | L'Europe Preromantique | |
131. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
132. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
133. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
134. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
135. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
136. | Chuck Joiner | User Group Report #519 The �Mad as Hell, Switching to Mac� PC Security Expert, the Rogue Valley Mac Expo, User Group Best Practices and A New Resource | The User Group Report with Chuck Joiner | |
137. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
138. | Giovanni Boccaccio | 049 - Day 5, Introduction | The Decameron | |
139. | Edguy | Introduction | Hellfire Club | |
140. | Edith Piaf | Introduction | Il Etait Une Voix | |
141. | Bob Biehl | Introduction | Focusing by Asking | |
142. | Erin Gautsche | Introduction | Reading at the KWH 10/19/05 | |
143. | Christian Bok | Introduction | Segue Reading Series / NY, May-19-2001 | |
144. | Edith Piaf | Introduction | Live at the Copacabana | |
145. | Edward Unger | Introduction | Computer Music Production School | |
146. | Bernadette Mayer | Introduction | The Line Reading Series. Recorded at The Drawing Center, New York City, May 11, 2004 | |
147. | Christian Bok | Introduction | Segue Reading Series / NY, May-19-2001 | |
148. | Solomon Jones and Erin Gaustche | Introduction | Live at the Writers House, Episode 72; October 20, 2008 | |
149. | Brent Philips | An Introduction | Unleash Your Inner Millionaire | |
150. | Travis E. Pike | Introduction | Grumpuss | |