ID | Interpret | Skladba | Album | |
61. | Maggie Johnson | Maggie Johnson: Google | Symposium 2008 | |
62. | Partnership for After School Education (PASE) | Ester Fuchs | 2007 OST Symposium | |
63. | Hugh W. Nibley | How to Write an Anti-Mormon Book | Symposium on Joseph Smith | |
64. | Heather A. Williams | Lincoln's Legacy | 2009 Lincoln Symposium | |
65. | Abigail Reynolds | Data Processing | Day-to-Day Data Symposium at ICA London | |
66. | Jonathan Klane, M.S.Ed | E-Learning and Web-Based Training 2.0 � How to Do It Now! | ASSE Virtual Symposium | |
67. | John David Smith | United States Colored Troops | 2009 Lincoln Symposium | |
68. | Hugh W. Nibley | How to Write an Anti-Mormon Book | Symposium on Joseph Smith | |
69. | Charles Bernstein | Reading University of Arizona Poetry Center May 31, 2008 | Conceptual Poetry and Its Others Symposium | |
70. | Adele Prince | Data Mapping | Day-to-Day Data Symposium at ICA London | |
71. | Craig Dworkin | UA Poetry Center | Conceptual Poetry and Its Others Symposium | |
72. | Larry Johnson | The Revolution Will Not Be Televised -- Rock the Academy | NMC Symposium: Rock the Adademy | |
73. | Christian Bök | UA Poetry Center | Conceptual Poetry and Its Others Symposium | |
74. | Jason Mellen and Brian King | Bridging the Lifelong Learning Gap | NMC Symposium on Evolution of Communication | |
75. | Caroline Bergvall | UA Poetry Center | Conceptual Poetry Symposium | |
76. | Cole Swensen | UA Poetry Center | Conceptual Poetry and Its Others Symposium | |
77. | Charles Bernstein | UA Poetry Center | Conceptual Poetry and Its Others Symposium | |
78. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
79. | Calvin Institute of Christian Worship | Vertical Habits: Practical Wisdom for Teaching Worship - panel hosted by Betty Grit | Calvin Symposium on Worship 2008 | |
80. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
81. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
82. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
83. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
84. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
85. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
86. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
87. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
88. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
89. | Steve Dovers | Beyond the barbed wire fence is a foreign country: thinking and managing across tenures | Place and Purpose Symposium 2009 | |
90. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |