ID | Interpret | Skladba | Album | |
61. | Hugues Vinet | Les extensions techniques de lÕcriture musicale | Diffusion des savoirs de l'Ecole normale suprieure - Paris | |
62. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
63. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
64. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
65. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
66. | Rawn Clark | Lesson Eight: Techniques of Mental Wandering | Self-Healing Archaeous | |
67. | Rawn Clark | Lesson Eight: Techniques of Mental Wandering | Self-Healing Archaeous | |
68. | Charles R. Swindoll | Realistic Techniques for Ministry Survival | Dallas Seminary Chapel | |
69. | Hugues Vinet | Les extensions techniques de lÕcriture musicale | Diffusion des savoirs de l'Ecole normale suprieure - Paris | |
70. | Battle of the Year BBoy Beats n Breaks Annual 2003 | 1200 Techniques - Battle Master | | |
71. | Battle of the Year BBoy Beats n Breaks Annual 2003 | 1200 Techniques - Battle Master | | |
72. | Harry Tuttle | 10 Standards -Based Formative Feedback Techniques for Your Classroom | NYSCATE 2008 | |
73. | Guitar Techniques | Guitar Techniques - Theory- The Lydian Flat 7 Scale | Guitar Techniques 2000 Apr | |
74. | Guitar Techniques | Guitar Techniques - Theory- The Lydian Flat 7 Scale | Guitar Techniques 2000 Apr | |
75. | Eric Rescorla, RTFM, Inc. | Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | |
76. | Doug Benson | Pink Noise and Hot Jazz: Restoration Techniques, Subtle and Profound | 2009 ARSC Conference -- www.arsc-audio.org | |
77. | Penny Haynes | PodCamp Atlanta - Editing Techniques, Tips and Music Mixing | (un)ConCast | |
78. | Cal Banyan's Online Supervision Program | Sample - Removing Old Useless Anger with Advanced Forgiveness Hypnotherapy Techniques | Removing Old Useless Anger with Advanced Forgiveness Hypnotherapy Techniques | |
79. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
80. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
81. | Wesley A. Fryer | Podcast169: A Conversation with Marco Torres about Light Saber Special Effect Techniques and Worthwhile Teacher Professional Development | Moving at the Speed of Creativity Podcasts | |
82. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
83. | Strategic News Service, LLC. | Using Supercomputers and Supervisualization Techniques: A conversation with Larry Smarr, Director, California Institute for Telecommunications and Information Technology, and Harry E. Gruber Professor | 2006 Future In Review (FiRe) Conference Mediacast | |