ID | Interpret | Skladba | Album | |
91. | SearchSecurity.com and Addison Wesley | Extrusion Detection: Defensible Network Architecture | | |
92. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
93. | Charles Lee and Frank Ling | Tsunami Detection -- Berkeley Groks 2006-09-27 | Berkeley Groks Science Radio Show | |
94. | Leo Laporte with Bill Handel | TLR 12: Leo on KFI with Bill Handel - Lexus Face Detection | TLR May 2007 | |
95. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
96. | Steve Gibson with Leo Laporte | Security Now 52: Security Bulletins - Sponsored by Astaro Corp. | Security Now August 2006 | |
97. | Steve Gibson with Leo Laporte | Security Now 65: Why Is Security So Difficult? - Sponsored by Astaro Corp. | Security Now November 2006 | |
98. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
99. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
100. | Steve Gibson with Leo Laporte | Security Now 66: Vista Security - Sponsored by Astaro Corp. | Security Now November 2006 | |
101. | Computerworld/Ian Lamont | Computerworld TechCast: Intrusion Detection and Prevention Systems | | |
102. | John Weston [MSFT] | TechNet Webcast Audio: Introduction to Windows PowerShell Scripting in Exchange Server 2007 | | |
103. | Amy Shojai | Pet Peeves Episode 49 The Big Bang Theory? ATF Explosives Detection Dogs | PetLifeRadio.com - Let's Talk Pets on Pet Life Radio | |
104. | Yale Cancer Center | Healthline September 24 - Detection and Treatment of Early Stage Prostate Cancer | Healthline Cancer Info | |
105. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
106. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
107. | Guanhua Yan, Los Alamos National Laboratory; Zhen Xiao, Peking University; Stephan Eidenbenz, Los Alamos National Laboratory | Catching Instant Messaging Worms with Change-Point Detection Techniques | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
108. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
109. | The Five Minute Linguist | How Many Languages are There? | Talking About Talk | |
110. | The Five Minute Linguist | Why do languages die? | Talking About Talk | |
111. | Morgan Phillips | Languages | Star Wars Breakbeats | |
112. | Darrell Harris | 5 Languages | IWS | |
113. | Morgan Phillips | Languages | Star Wars Breakbeats | |
114. | Carl Barron | Languages | Carl Barron Live | |
115. | Listen to English | Languages | | |
116. | Brothers Grimm | 43 - The Three Languages | Grimm's Fairy Tales | |
117. | Listen to English | Languages | | |
118. | Listen to English | Languages | | |
119. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
120. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |