ID | Interpret | Skladba | Album | |
61. | Computerworld | computerworld techcast tape virtualization | | |
62. | Computerworld, Ian Lamont, Joyce Carpenter | Computerworld TechCast: The Turing Test | | |
63. | Computerworld | Computerworld TechCast: Creative Commons | | |
64. | Computerworld | Computerworld TechCast: Flash Animation | | |
65. | Computerworld | Computerworld TechCast: Hosted Services 2 | | |
66. | Computerworld | Computerworld TechCast: Midrange Storage | | |
67. | Computerworld, Ian Lamont, Joyce Carpenter | Computerworld TechCast: Biometric Authentication | | |
68. | Computerworld | Computerworld Techcast: Pandemic Planning | | |
69. | Computerworld | Computerworld TechCast: Markup languages | | |
70. | Computerworld/Joyce Carpenter/Ian Lamont | Computerworld TechCast: Ruby On Rails | | |
71. | Computerworld, Ian Lamont, Joyce Carpenter, Whitfield Diffie | Computerworld TechCast: Public-Key Encryption | | |
72. | Computerworld.com | Computerworld TechCast: Remote Administration Trojans | | |
73. | Computerworld | Computerworld Techcast: Enterprise Information Integration | | |
74. | Computerworld | Computerworld TechCast: Barriers to Vista Adoption | | |
75. | Computerworld | Computerworld TechCast: Desktop backup strategies 1 | | |
76. | Computerworld | Computerworld TechCast: Hosted Services and Applications 1 | | |
77. | Computerworld, Ian Lamont, Joyce Carpenter | Computerworld TechCast: Java for Rails Developers | | |
78. | Computerworld, Joyce Carpenter, Ian Lamont | Computerworld TechCast: Preboot Execution Environment | | |
79. | Computerworld/Ian Lamont | Computerworld TechCast: Intrusion Detection and Prevention Systems | | |
80. | Computerworld, Ian Lamont, Ray Kurzweil | Computerworld Techcast: Ray Kurzweil, Part I: The future of computing | | |
81. | Dr. Neal Krawetz | You Are What You Type: Non-Classical Computer Forensics | Black Hat USA 2006 | |
82. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes | CERT's Podcasts for Business Leaders | |
83. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
84. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
85. | Tek Talk Planning Team | Computer Forum - Questions dealing with all aspects of using the computer | Tek Talk Archives | |
86. | Cecil Otter & Paper Tiger | Forensics | Doomtree: False Hopes 13 | |
87. | Carrigan | Forensics | Carrigan | |
88. | Carrigan | Forensics | Carrigan | |
89. | Marketing Communications | UWF Forensics Team | Weekly Podcast | |
90. | smokering.co.uk | Forensics - December 2006 MIX | smokering.co.uk | |