ID | Interpret | Skladba | Album | |
151. | Andy Zeigler | TechNet Webcast: Windows Preinstallation Environment 2.0 for Windows Vista Deployment | | |
152. | Heather - Webcast Team | TechNet Webcast Audio: Assess Your Server IT Infrastructure for Windows Server 2008 Migration and Virtualization | | |
153. | Baldwin Ng | TechNet Webcast: Using Windows Vista Hardware Assessment to Determine the Capabilities of Your Organizations Computer Hardware | | |
154. | Dan Reger; Heather - Webcast Team | TechNet Webcast: Maximize New Server Hardware Potential with Windows Server 2003 Enterprise x64 Edition | | |
155. | Blain Barton; Heather - Webcast Team | TechNet Webcast Audio: Windows Vista and Windows Server 2008 Branch Office Technology | | |
156. | Chris Henley | TechNet Webcast: Next-Generation Networking with Windows Vista and Windows Server Code-Named Longhorn | | |
157. | Brad Clark; TechNet | TechNet Webcast: The Improved Exchange System Manager for Exchange 12 | | |
158. | Blain Barton | TechNet Webcast: Deploying Windows Vista and the 2007 Office System with Business Desktop Deployment 2007 | | |
159. | Alex - Webcast Team | TechNet Webcast Audio: Managing Exchange Server and SharePoint Protection with Forefront Server Security Management Console | | |
160. | Bryan MS | TechNet Webcast: Enhancements to Windows Firewall in Windows Vis | | |
161. | Todd Luttinen | TechNet Webcast: Troubleshooting Exchange Server Mail Flow Issues Using the Exchange Troubleshooting Assistant 1.1 | | |
162. | Wzhang | TechNet Webcast: Exchange Server Database Troubleshooting and Recovery with the Exchange Troubleshooting Assistant 1.1 | - | |
163. | Bryan MS | TechNet Webcast: Windows Windows Deployment Services: Setup and Deployment | | |
164. | Jay G Foonberg | Bombard Your Clients With Christmas Cards And Other Greeting Cards | | |
165. | Heather - Webcast Team | TechNet Webcast Audio: Mining for Quality: Apply Adaptive Data Quality with SQL Server Data Mining | | |
166. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
167. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
168. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
169. | Host Dale Kutnick and Guest Ant Allan | Strong Authentication | Gartner Voice | |
170. | Monica Mork and Erik Mork | 058 2009.02.11 Web Service Authentication | Sparkling Client - The Silverlight Podcast | |
171. | Computerworld, Ian Lamont, Joyce Carpenter | Computerworld TechCast: Biometric Authentication | | |
172. | Phone Losers of America | PLA Radio Episode #17 - Voice Authentication | PLA Radio | |
173. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
174. | Joseph W. Graham | 802.1x: Adapting Wireless Authentication to the Wired World | EDUCAUSE - Annual Conference - 2005 | |
175. | Steve Gibson with Leo Laporte | Security Now 113: Roaming Authentication - Sponsored by Astaro Corp. | Security Now October 2007 | |
176. | WCC Genesys North America | Effective Strategies for Implementing HR BPO | | |
177. | Ian & Nina Fry | Implementing CDG Curriculum in Your Church | 2007 Children Desiring God Conference | |
178. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
179. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
180. | Web Standards Group London | Jeremy Keith: Implementing Microformats | Web Standards Group London | |