ID | Interpret | Skladba | Album | |
121. | Professor John Hooker | A World Economic Order Based on Cultural Comparative Advantage | LSE Public Lectures and Events | |
122. | Trustworthy Computing | Using the Claims-based Identity Platform to Convey Trust Across Boundaries - LWSD | | |
123. | Sean Ongley | Portland Artists of the Time Based Arts Festival and the Leftbank Project | Special Program of KBOO fm | |
124. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
125. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | CERT's Podcasts for Business Leaders | |
126. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
127. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
128. | Josh Brown & Carl Kruger | 04. left wing internet radio propaganda sample based track | We Are Not Want Quiet | |
129. | Verizon Business | Verizon Business: Real Time Customizable Network-based Firewall | | |
130. | Claudio Schapsis | Interview with Shane Lennon About Location Based Social Networks Business | www.bdnooz.com | |
131. | Verizon Business | Verizon Business: Real Time Customizable Network-based Firewall | | |
132. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
133. | President George W. Bush | President Bush Discusses the Faith-Based and Community Initiative - January 29, 2008 | Presidential Speeches & Remarks | |
134. | Directions Media | Tim Lorello from TCS on Real-time Traffic and Location-based Advertising on Mobile Handsets | | |
135. | Terry O'Hanlon-Rose, CEO & Director Australian Technical College, North Brisbane | The Effectiveness of Employment-based Training Models in Senior Secondary VET in Schools Programs | OctoberVET 2008 | |
136. | Barry Kantz | Home Based Travel Agent #1 2/26/2005 ( Created With MixCast Live http://mixcastlive.com ) | Home Based Travel Agent | |
137. | Barry Kantz | Home Based Travel Agent #2 3/3/2005 ( Created With MixCast Live http://mixcastlive.com ) | Home Based Travel Agent | |
138. | Chris May | Better Incident Response through Scenario-Based Training - Part 3: Using XNET for Simple and Complex Scenarios | CERT's Podcasts for Business Leaders | |
139. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
140. | Tracy Chapman | Stayin' Alive: Surviving the Dreams and Realities of Assessing Full-Time, Web-Based Student Learning | EDUCAUSE 2005 Annual Conference | |
141. | Amanda Rabinowitz | Akron surgeon treats children as part of Kent-based Palestine Childrens Relief Fund | (c) 2008, WKSU | |
142. | Science Audio | PTJ's Podcast Debate for July 2009: Developing and Using Treatment-Based Clinical Prediction Rules - Part 2 of 2 | Physical Therapy - PTJ | |
143. | Science Audio | PTJ's Podcast Debate for July 2009: Developing and Using Treatment-Based Clinical Prediction Rules - Part 1 of 2 | Physical Therapy - PTJ | |
144. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
145. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
146. | President George W. Bush | President Bush Attends White House Summit on Inner-City Children and Faith-Based Schools - April 24, 2008 | Presidential Speeches & Remarks | |
147. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
148. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
149. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
150. | Eric James Wolf | SWC #039 Steve Denning - The Knowledge based organization: using stories to embody and transfer knowledge. | The Art of Storytelling with Childen Podcast | |