ID | Interpret | Skladba | Album | |
61. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
62. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
63. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
64. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
65. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
66. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
67. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
68. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
69. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
70. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
71. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
72. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
73. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
74. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
75. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
76. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
77. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
78. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
79. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
80. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
81. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
82. | Larry Johnson | Symposium Closing | 2009 NMC Symposium on New Media & Learning | |
83. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
84. | Dagfinn Føllesdal, Bruna de Marchi, Merle Jacob and Ian Hacking | Discussion | Holberg Prize Symposium 2009: Ian Hacking | |
85. | Dagfinn Føllesdal, Bruna de Marchi, Merle Jacob and Ian Hacking | Discussion | Holberg Prize Symposium 2009: Ian Hacking | |
86. | Ian Hacking | Comments | Holberg Prize Symposium 2009: Ian Hacking | |
87. | Humanitarian FOSS Project | Panel on "Open Source in the Curriculum" | Humanitarian FOSS Project Symposium 2009 | |
88. | Ian Hacking | Comments | Holberg Prize Symposium 2009: Ian Hacking | |
89. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
90. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |