ID | Interpret | Skladba | Album | |
151. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
152. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
153. | Rev Dr Prabhudas Koshy | Prayer: The Discovery Channel of Great and Mighty Things | Jeremiah 33:3 | |
154. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
155. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
156. | financialdna | Financial DNA White Paper: Accelerate Your Risk Profile Discovery | Financial DNA | |
157. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: E-mail in an e-discovery age; Sharp's new High-Def HD recorders | | |
158. | Evan Cooke | The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery | nsdi06-day1-3 | |
159. | Jason Perlow / ZDNet / CBS Interactive | Jason Perlow interviews John Cohn from Discovery Channel's The Colony | | |
160. | Jason Perlow / ZDNet / CBS Interactive | Jason Perlow interviews John Cohn from Discovery Channel's The Colony | | |
161. | Computerworld | Storage This Week: E-discovery, old e-mails, and lawsuits; Hybrid high-definition DVDs | | |
162. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 4: Key Roles; Steps for Getting Started | CERT's Podcasts for Business Leaders | |
163. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
164. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
165. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
166. | St. Augustine of Hippo | Chs. 1-11, Bk. 1: Interpretation of Scripture depends on discovery and enunciation of meaning and should be undertaken in dependence on God. Definition of things and signs. Some things for use and som | On Christian Doctrine | |
167. | Thomas C. Oden | Libyan Christianity 1: A Libyan History Awaiting Discovery | Dallas Seminary Chapel | |
168. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: A paper-based storage system; Most storage managers unprepared for e-discovery rules | | |