ID | Interpret | Skladba | Album | |
31. | Building Block Christian Faith | Can I Lose My Salvation? Secure Forever! | AFA Vol. 1 Number 1 | |
32. | Building Block Christian Faith | Can I Lose My Salvation? Secure Forever! | AFA Vol. 1 Number 1 | |
33. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
34. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
35. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
36. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
37. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
38. | Highview Baptist Church - Fegenbush Campus Audio Podcast | How To Make A Secure Investment - Matthew 19:16-30 | Highview Baptist Church - Fegenbush Campus Audio Podcast | |
39. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
40. | Pastor Bob W. Smith | Financially Secure And Spiritually Bankrupt [08-21-05 SUN AM] | Trinity Baptist Church, Arlington, TX | |
41. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
42. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
43. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
44. | Bryan MS | Establishing a Secure and Manageable Messaging Infrastructure | | |
45. | Gary McGraw | How to Start a Secure Software Development Program | CERT’s Podcasts for Business Leaders | |
46. | Amy Welborn | De-Coding The Da Vinci Code | | |
47. | Amy Welborn | De-Coding The Da Vinci Code | | |
48. | Amy Welborn | De-Coding The Da Vinci Code | | |
49. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
50. | Bryan MS | TechNet Webcast: Secure Messaging with Microsoft Antigen (Level | | |
51. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
52. | Aaron; Sandy Sharma | Planning and Deploying a Secure Messaging Solution with Exchange Server 2007 | | |
53. | Freedom Scientific | September 2009 - More JAWS 11; Research It; Secure Braille Driver Initiative; Jim Ellsworth | FSCast | |
54. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
55. | Best Business Practices - info@sustainablefoundation.org | Best Business Practices - info@sustainablefoundation.org | Best Business Practices - info@sustainablefoundation.org | |
56. | Best Business Practices - info@sustainablefoundation.org | Best Business Practices - info@sustainablefoundation.org | Best Business Practices - info@sustainablefoundation.org | |
57. | Gloria Taraniya Ambrosia | 2004-05/05 Making Our Practice Real! - Attachment To Precepts And Practices | Cambridge Insight Meditation Center http://www.cimc.info/ | |
58. | CMC Media | CM Today Includes Computerworld Announces Finalists for the 2007 Best Practices in Business Intelligence | | |
59. | CMC Media | CM Today Includes Computerworld Announces Finalists for the 2007 "Best Practices in Business Intelligence" | | |
60. | St. John's Lutheran Church, Oxnard, CA, Pastor Mark Beyer | Hope To Cope: Making Your Case For The Lord | Hope To Cope | |