ID | Interpret | Skladba | Album | |
31. | Elbow | Leaders Of The Free World | Leaders Of The Free World | |
32. | Elbow | My Very Best | Leaders of the Free World | |
33. | Elbow | Forget Myself | Leaders Of The Free World | |
34. | Elbow | My Very Best | Leaders of the Free World | |
35. | Ranald Macaulay | Secular Context; Xn Worldview | ELF2003 Leaders In Society Nwk | |
36. | Marsh Moyle | The Gospel in Society | ELF2003 Leaders In Society Nwk | |
37. | Elbow | Forget Myself | Leaders of the Free World | |
38. | Elbow | Forget Myself | Leaders Of The Free World | |
39. | Elbow | Picky Bugger | Leaders Of The Free World | |
40. | J. L. Panagopolous | Putting It All Together | Readers Make Leaders | |
41. | Elbow | Forget Myself | Leaders of the Free World | |
42. | Elbow | Forget Myself | Leaders of the Free World | |
43. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 3: Developing & Exercising a Business Continuity Plan | CERT’s Podcasts for Business Leaders | |
44. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations | CERT’s Podcasts for Business Leaders | |
45. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 2: Some Challenges, and Work in Progress | CERT's Podcasts for Business Leaders | |
46. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
47. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
48. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
49. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 4: Key Roles; Steps for Getting Started | CERT's Podcasts for Business Leaders | |
50. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles | CERT's Podcasts for Business Leaders | |
51. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
52. | David Matthews | Integrating Security Incident Response and e-Discovery | CERT's Podcasts for Business Leaders | |
53. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request | CERT's Podcasts for Business Leaders | |
54. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 1: The Increasing Scope and Importance of Business Continuity Planning | CERT’s Podcasts for Business Leaders | |
55. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 2: How Can I Find Out if a Peer-to-Peer Disclosure Has Occurred? | CERT’s Podcasts for Business Leaders | |
56. | Clint Kreitner | Getting to a Useful Set of Security Metrics | CERT's Podcasts for Business Leaders | |
57. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 3: Where to Start | CERT's Podcasts for Business Leaders | |
58. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy | CERT's Podcasts for Business Leaders | |
59. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players | CERT’s Podcasts for Business Leaders | |
60. | Robert Seacord | Mainstreaming Secure Coding Practices | CERT's Podcasts for Business Leaders | |