ID | Interpret | Skladba | Album | |
1. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
2. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
3. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
4. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
5. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
6. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
7. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
8. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
9. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
10. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
11. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
12. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
13. | Jim Cahill | From Smart Dust to Reliable Wireless Sensor Networks | Emerson Process Experts | |
14. | Host Jackie Fenn and Guest Nick Jones | The Evolution of Sensor Networks | Gartner Voice | |
15. | Host Jackie Fenn and Guest Nick Jones | The Evolution of Sensor Networks | Gartner Voice | |
16. | Host Jackie Fenn and Guest Nick Jones | The Evolution of Sensor Networks | Gartner Voice | |
17. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
18. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
19. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
20. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
21. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
22. | Drew Baron | TechNet Webcast: Deploying and Managing Wireless Networks with Windows Vista | | |
23. | Claudio Schapsis | Interview with Shane Lennon About Location Based Social Networks Business | www.bdnooz.com | |
24. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
25. | Host Bob Hafner and Guest John Girard | Five Wireless Security Technologies | Gartner Voice | |
26. | Host Bob Hafner and Guest John Girard | Five Wireless Security Technologies | Gartner Voice | |
27. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
28. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
29. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
30. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |