ID | Interpret | Skladba | Album | |
31. | A. W. Pink | The Inspiration of the Bible 05 | The Inspiration of the Bible | |
32. | Jerry White | Authority, Inspiration, And Sufficiency Of The Bible | | |
33. | David Fraser | 2008-05-31 How Did We Get the Bible? | Pasdac 2008 | |
34. | David Fraser | 2008-05-31 How Did We Get the Bible? | Pasdac 2008 | |
35. | David Fraser | 2008-05-31 How Did We Get the Bible? | Pasdac 2008 | |
36. | David Fraser | 2008-05-31 The Bible, The Quran and The Bhagavad Gita - Which Speaks for God? | Pasdac 2008 | |
37. | Bad Friend | I Trusted You | Previously Unreleased | |
38. | One Star Hotel | Cant Be Trusted | | |
39. | Elder William R. Walker | Can You Be Trusted? | New Era November 2006 | |
40. | Forty Winks | The Day I Trusted You | Sweet Sweet Frenzy EP | |
41. | Wise Blood | 2 ALL THE GIRLS WHO HAVE TRUSTED ME | | |
42. | The Promise Ring | I Never Trusted The Russians | The Horse Latitudes | |
43. | The Promise Ring | I Never Trusted The Russians | The Horse Latitudes | |
44. | Wise Blood | 2 ALL THE GIRLS WHO HAVE TRUSTED ME | | |
45. | Continental Fruit | A Trusted Friend | Million Ways To Spend Your Time | |
46. | Tom Smith | The Most Trusted Man In Nigeria | The FuMP | |
47. | Business Intelligence Network | Guided and Trusted | Audio Article | |
48. | BeyeNETWORK | When Data Can't Be Trusted | Audio Article | |
49. | Florence Louisa Barclay | 27 - The Eyes Garth Trusted | The Rosary | |
50. | tear garden | her majestys trusted food taster | | |
51. | tear garden | her majestys trusted food taster | | |
52. | ID Mashup 2006 | Towards an Open Identity Layer and Trusted Exchange: What Might It Look Like? | AudioBerkman | |
53. | ID Mashup 2006 | Towards an Open Identity Layer and Trusted Exchange: What Might It Look Like? | AudioBerkman | |
54. | ID Mashup 2006 | Towards an Open Identity Layer and Trusted Exchange: What Might It Look Like? | AudioBerkman | |
55. | Clarke Patterson, Product Marketing Manager, IBM | How Trusted Information Powers Business Optimization | | |
56. | Wilhelm Dolle | Trusted-Computing Anwendungen mit Open Source Software | Chemnitzer Linux-Tage 2007 | |
57. | Wilhelm Dolle | Trusted-Computing Anwendungen mit Open Source Software | Chemnitzer Linux-Tage 2007 | |
58. | Wilhelm Dolle | Trusted-Computing Anwendungen mit Open Source Software | Chemnitzer Linux-Tage 2007 | |
59. | Gene Ferioli | TechNet Webcast: Enabling Trusted Communications and Health Poli | | |
60. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |