ID | Interpret | Skladba | Album | |
181. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
182. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
183. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
184. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
185. | In-House Legal | Lilly Ledbetter Fair Pay Act of 2009 and Saving through E-Discovery | (c) www.LegalTalkNetwork.com | |
186. | Rev Dr Prabhudas Koshy | Prayer: The Discovery Channel of Great and Mighty Things | Jeremiah 33:3 | |
187. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
188. | Dan Theodorescu, M.D., Ph.D. | Novel Paradigms for Personalized Therapy and Drug Discovery in Cancer | Medical Center Hour | |
189. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
190. | financialdna | Financial DNA White Paper: Accelerate Your Risk Profile Discovery | Financial DNA | |
191. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: E-mail in an e-discovery age; Sharp's new High-Def HD recorders | | |
192. | Jason Perlow / ZDNet / CBS Interactive | Jason Perlow interviews John Cohn from Discovery Channel's The Colony | | |
193. | Jason Perlow / ZDNet / CBS Interactive | Jason Perlow interviews John Cohn from Discovery Channel's The Colony | | |
194. | Evan Cooke | The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery | nsdi06-day1-3 | |
195. | Computerworld | Storage This Week: E-discovery, old e-mails, and lawsuits; Hybrid high-definition DVDs | | |
196. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
197. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
198. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
199. | http://MediaVoiceOvers.com | LOSTcasting With Wayne And Dan #15 by Wayne Henderson Voice-Overs, The Incident | LOSTcasting With Wayne And Dan | |
200. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | CERT’s Podcasts for Business Leaders | |