ID | Interpret | Skladba | Album | |
181. | Quasthoff, Thomas | Dichterliebe, song cycle for voice & piano, Op. 48: Die Alten Bösen Lieder | Schumann: Dichterliebe Op48; Liederkreis, cycle of 12 songs Op39 | |
182. | Quasthoff, Thomas | Dichterliebe, song cycle for voice & piano, Op. 48: Im Rhein, Im Heiligen Strome | Schumann: Dichterliebe Op48; Liederkreis, cycle of 12 songs Op39 | |
183. | The Cow Exchange | Rockopolousaninjananophone Eternal - The Vishnu Cycle - - If You're Still Reading This Title On A Scrolling Display You Are A Better Man Than I | Songs With Which To Hxaro Glenn | |
184. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
185. | Allan Gyorke and Jeff Swain | Running with the Pack 44: Cycle-thon, Epic Wipeout, and Warming Weather | Running with the Pack | |
186. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
187. | Hazardous Waste Clean-Up Information | AUGU 13, 2007: Life Cycle Thinking and Solid Waste: A State's Perspective | | |
188. | Peter Reddaway, professor emeritus of political science and international affairs at The George Washington University | Can the Kremlin Control the Election Cycle? The Politics of the Upcoming Elections for the Duma and the Presidency | Johns Hopkins SAIS Events - Fall 2007 | |
189. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
190. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
191. | Secret Agent | 03 - Secret Agent - Secret Agent Man (Karaoke) | Secret Agent Man (single) | |
192. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
193. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
194. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 4: Software Process and Raising Awareness | CERT’s Podcasts for Business Leaders | |
195. | Chogyam Trungpa | Cynical Letter, A Letter to Marpa, Sound Cycle (Aham) | Dial-A-Poem Poets: Disconnected | |
196. | Chogyam Trungpa | Cynical Letter, A Letter to Marpa, Sound Cycle (Aham) | Dial-A-Poem Poets: Disconnected | |
197. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
198. | Sam Champion | Like a Secret | Sam Champion | |
199. | China Crisis | Best Kept Secret | What Price Paradise | |
200. | Sam Champion | Like A Secret | | |