ID | Interpret | Skladba | Album | |
121. | Todd Luttinen | TechNet Webcast: Troubleshooting Exchange Server Mail Flow Issues Using the Exchange Troubleshooting Assistant 1.1 | | |
122. | Wzhang | TechNet Webcast: Exchange Server Database Troubleshooting and Recovery with the Exchange Troubleshooting Assistant 1.1 | - | |
123. | Bryan MS | TechNet Webcast: Windows Windows Deployment Services: Setup and Deployment | | |
124. | Jay G Foonberg | Bombard Your Clients With Christmas Cards And Other Greeting Cards | | |
125. | Heather - Webcast Team | TechNet Webcast Audio: Mining for Quality: Apply Adaptive Data Quality with SQL Server Data Mining | | |
126. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
127. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
128. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
129. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
130. | Monica Mork and Erik Mork | 058 2009.02.11 Web Service Authentication | Sparkling Client - The Silverlight Podcast | |
131. | Computerworld, Ian Lamont, Joyce Carpenter | Computerworld TechCast: Biometric Authentication | | |
132. | Phone Losers of America | PLA Radio Episode #17 - Voice Authentication | PLA Radio | |
133. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
134. | Joseph W. Graham | 802.1x: Adapting Wireless Authentication to the Wired World | EDUCAUSE - Annual Conference - 2005 | |
135. | Steve Gibson with Leo Laporte | Security Now 113: Roaming Authentication - Sponsored by Astaro Corp. | Security Now October 2007 | |
136. | Ian & Nina Fry | Implementing CDG Curriculum in Your Church | 2007 Children Desiring God Conference | |
137. | WCC Genesys North America | Effective Strategies for Implementing HR BPO | | |
138. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
139. | PGP Corporation | Colleen Ebel on Implementing Encryption | PGP® Security Podcasts | |
140. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
141. | Web Standards Group London | Jeremy Keith: Implementing Microformats | Web Standards Group London | |
142. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
143. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
144. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
145. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
146. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
147. | Harold Boeck | RFIDRadio-016 - Implementing RFID in a store quickly | RFID Radio | |
148. | Craig Shoemaker | Implementing MVVM and Exploring UX Design Patterns | Pixel8 :: http://getpixel8ed.com/ | |
149. | Harold Boeck | RFIDRadio-013 - Implementing RFID in the Retail Industry | RFID Radio | |
150. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 108 - Implementing Process Improvement as a PMO Best Practice | The PMO Podcast | |