ID | Interpret | Skladba | Album | |
61. | http://www.mckeay.net | Network Security Podcast, Episode 35 | Martin McKeay | |
62. | http://www.mckeay.net | Network Security Podcast, Episode 19 | Martin McKeay | |
63. | http://www.mckeay.net | Network Security Podcast, Episode 20 | Network Security Podcast | |
64. | Martin McKeay and Rich Mogull | Network Security Podcast, RSA 2009 Conference | http://netsecpodcast.com | |
65. | http://www.mckeay.net | Network Security Podcast, Episode 13, 020606 | Network Security Podcast | |
66. | Colin Childs, Instructor, ESRI | ArcGIS Network Analyst: Networks and Network Models | ESRI Instructional Series | |
67. | http://www.mckeay.net | Network Security Podcast, Episode 18, March 14, 2006 | Network Security Podcast | |
68. | Martin McKeay and Rich Mogull | Network Security Podcast, RSAC 2009 Microcast 2 | http://netsecpodcast.com | |
69. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |
70. | Martin McKeay and Rich Mogull | Network Security Podcast, Defcon Microcast 11: David Byrne and Eric Duprey | http://netsecpodcast.com | |
71. | ECT News Network | ECT News Network - ECT News Network Weekly Recap January 18, 2008 | ECT News Network Weekly Recap | |
72. | Dennis A. Baldwin | Rubi Con 2001 - The right way to set up an NT workwork | Rubi Con 2001 | |
73. | Bubonic | Rubi Con 2001 - Linux Firewalls | Rubi Con 2001 | |
74. | Ech0 | Rubi Con 2001 - Hackers have feelings t00 | Rubi Con 2001 | |
75. | Tiffany St. Patrick-Wells | Rubi Con 2001 - Warrants, Wiretaps, and Probable Cause | Rubi Con 2001 | |
76. | Flame0ut and Prussian Snow | Rubi Con 2001 - Blind Courier Protocols | Rubi Con 2001 | |
77. | Dennis Salguero | Rubi Con 2001 - Going Legit: How to Start Your Own Consulting Business | Rubi Con 2001 | |
78. | Tiffany St. Patrick-Wells | Rubi Con 2001 - Two types of trouble: Criminal and civil liability | Rubi Con 2001 | |
79. | Ron Rivest | Security of Voting Systems | USENIX NSDI 2007 | |
80. | Dan Matthews | Hardware Bus Security in Embedded Systems | The Fifth HOPE | |
81. | Dan Matthews | Hardware Bus Security in Embedded Systems | The Fifth HOPE | |
82. | Kevin Dick | Security Taxonomy of Web Services and Distributed Systems | WebServicesSummit.com audiocast collection | |
83. | Kevin Dick | Security Taxonomy of Web Services and Distributed Systems | WebServicesSummit.com audiocast collection | |
84. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
85. | Daryl Bradford Smith, Paul Craig Roberts | 2005 09 07 Wed. REX 84, Homeland Security, FEMA Camps & TSA Control Systems. | The French Connection | |
86. | Nancy Fox | It's All About The Network | www.SalesRepRadio.com | |
87. | Eric Allison | Network | | |
88. | Paul Cantor | When is a Network Not a Network? | Commerce and Culture | |
89. | BBC Micro | Network | | |
90. | project djinky | Network | Haus of beatz | |