ID | Interpret | Skladba | Album | |
1. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
2. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
3. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
4. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
5. | Jun Senoue, Naofumi Hataya, Hideaki Kobayashi, Keiichi Sugiy | Boss - Robot Carnival, Robot Storm | Complete Trinity: Sonic Heroes Original Soundtrax | |
6. | US Institute of Peace | Securing Development | Passing the Baton 2009 | |
7. | College Answer Guy | Securing Scholarships | College Answer Guy | |
8. | MU News Bureau | 03.03.06 Cell Detection | Spotlight on Science | |
9. | MU News Bureau | 12.16.05 Traffic Detection | Spotlight on Science | |
10. | Edited by Douglas G. Greene | Detection by Gaslight | | |
11. | Atomine Elektrine | Plasmoid Detection | Nebulous | |
12. | Erich Gliebe | Securing a White Homeland | American Dissident Voices | |
13. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
14. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
15. | Adam Graham | The Vital Nature of Securing the Border | | |
16. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
17. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
18. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
19. | Rich Cannings | Android: Securing a Mobile Platform from the Ground Up | Security 09 | |
20. | AudioBerkman | Ron Deibert on Securing Human Rights Online | Berkman Center for Internet & Society | |
21. | ABC Local Radio | John Dwyer, securing Jerry Seinfeld for the ad | Coast Breakfast with Peter Scott | |
22. | PGP Corporation | Securing Laptop Computers at Baylor University | PGP® Security Podcasts | |
23. | Chris Gradwohl | TechNet Webcast: Securing Active Directory | | |
24. | Charles Lee and Frank Ling | Tsunami Detection -- Berkeley Groks 2006-09-27 | Berkeley Groks Science Radio Show | |
25. | Leo Laporte with Bill Handel | TLR 12: Leo on KFI with Bill Handel - Lexus Face Detection | TLR May 2007 | |
26. | SearchSecurity.com and Addison Wesley | Extrusion Detection: Defensible Network Architecture | | |
27. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
28. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
29. | Computerworld/Ian Lamont | Computerworld TechCast: Intrusion Detection and Prevention Systems | | |
30. | Doug Mueller | Lower Service Support Costs and Increase Business Value Through a Holistic Approach: Doug Mueller,Chief Technology Officer in the Service Management Business Unit of BMC Software | TalkBMC Podcast | |