ID | Interpret | Skladba | Album | |
121. | Chuck Willis and Rohyt Belani | Web Application Incident Response and Forensics: A Whole New Ball Game! | Black Hat USA 2006 | |
122. | Steve Gibson with Leo Laporte | Security Now 55: Application Sandboxes - Sponsored by Astaro Corp. | Security Now August 2006 | |
123. | Steve Gibson with Leo Laporte | Security Now 55: Application Sandboxes - Sponsored by Astaro Corp. | Security Now August 2006 | |
124. | Interwoven's GearUp Podcast | Conference Highlights: Composite Application Provisioning Solutions | podcast@interwoven.com | |
125. | Interwoven's GearUp Podcast | Session Preview: Achieve Automated Application Provisioning | podcast@interwoven.com | |
126. | Alex Wunschel | Blick 178 ARD-ZDF-Onlinestudie, Playboy-Verlosung, Twitter Brand Index und Facebook-Gangster | Tellerrand | |
127. | Various Speakers | Conflict Prevention and Resolution Forum: The Global Peace Index: Its Value and Implications, and the Next Steps | Johns Hopkins SAIS Events - Summer 2007 | |
128. | Hari Kannan | Hardware Enforcement of Application Security Policies Using Tagged Memory | OSDI '08 | |
129. | CMC Media | CM Today Includes Application Lifecycle Management Conference 2007 | | |
130. | Blain Barton | TechNet Webcast: Application Compatibility Considerations with Windows Vista | | |
131. | Hari Kannan | Hardware Enforcement of Application Security Policies Using Tagged Memory | OSDI '08 | |
132. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
133. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
134. | CMC Media | CM Today Includes Compuware Delivers Greater Application Development Productivity From the Web to the Mainframe With Uniface 9.1 | | |
135. | Benko | MSDN Webcast: Integrating Office Data Analysis and Charting Tools into a Client Application | | |
136. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
137. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
138. | Irving Wladawsky-Berger | Lecture 05: Operationalizing the strategy - key internal factors; Market and application segmentation, internal measurements, management reviews | MIT OCW: ESD.57 Technology-based Business Transformation, Fall 2007 | |
139. | Harriet Bond | Our Commandment Love God Love your Neighbor 10-16-09 | Thy Way Ministries | |
140. | Jami Smith | 02 Worship You | Home | |
141. | Hadhrat Mirza Masroor Ahmad (at) | Worship of God | Friday Sermons-2008 | |
142. | Escape Mechanism | Worship | Cast Of Thousands With Escape Mechanism | |
143. | Rebecca St. James | Here I Am to Worship | Live Worship: Blessed Be... | |
144. | David Hocking | The Worship of God | Attributes of God | |
145. | Rebecca St. James | Here I Am to Worship | Live Worship: Blessed Be... | |
146. | Dave Milliken | We're Here To Worship | | |
147. | Calvary Church Orchestra Rehearsal Track | Worship You | | |
148. | Darkness Eternal | Worship Us | Misanthropic Annihilation | |
149. | Dan Price | Worship | Choose Your Own Adventure | |
150. | Calvary Church Rehearsal Track | Worship You | | |