Ranked #1

The Enigma Code
The Enigma Code
18 Dec 2009
•
1hr 5mins
Ranked #2

Campus Website Content Management
Campus Website Content Management
24 Jun 2009
•
2hr 4mins
Similar Podcasts
Ranked #3

The Automation of Network Inventory
The Automation of Network Inventory
18 Jun 2009
•
55mins
Ranked #4

Computing Services Conference General Session
Computing Services Conference General Session
18 Jun 2009
•
37mins
Ranked #5

High Security Workstation: Seeking a Cost-effective, Productive Solution
High Security Workstation: Seeking a Cost-effective, Productive Solution
18 Jun 2009
•
44mins
Ranked #6

IT Security Policy Compliance and Auditing at UC Davis
IT Security Policy Compliance and Auditing at UC Davis
18 Jun 2009
•
48mins
Ranked #7

Secure Sockets Layer Virtual Private Network (SSL VPN): A Look at UC Davis Through the Tunnel
Secure Sockets Layer Virtual Private Network (SSL VPN): A Look at UC Davis Through the Tunnel
18 Jun 2009
•
1hr 7mins
Ranked #8

Data Quality in an Emergency Notification System
Data Quality in an Emergency Notification System
18 Jun 2009
•
1hr 1min
Ranked #9

Enterprise Office 2007 Migration Lessons Learned: How we upgraded 9K systems over one weekend
Enterprise Office 2007 Migration Lessons Learned: How we upgraded 9K systems over one weekend
18 Jun 2009
•
47mins
Ranked #10

Implementing An Extensible Role-Based Security Module in a Java Web Development Framework
Implementing An Extensible Role-Based Security Module in a Java Web Development Framework
18 Jun 2009
•
53mins