ID | Interpret | Skladba | Album | |
1. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
2. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
3. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
4. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 1: The Economics of Privacy Breaches | CERT Podcasts for Business Leaders | |
5. | Sigrid Fry-Revere | HIV Testing: No Consent and No Privacy | Sigrid Fry-Revere | |
6. | Dr. Todd Curtis | Recognizing a Privacy Problem and Top 10 Tips to Protect Your Online Privacy | Parenting and the Internet | |
7. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
8. | Gary McGraw | How to Start a Secure Software Development Program - Part 1: The Evolution of Secure Software Development | CERT’s Podcasts for Business Leaders | |
9. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 4: Software Process and Raising Awareness | CERT’s Podcasts for Business Leaders | |
10. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 2: The Evolution of User Attitudes | CERT Podcasts for Business Leaders | |
11. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 3: Lessons Learned and the Future | CERT Podcasts for Business Leaders | |
12. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
13. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
14. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
15. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
16. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
17. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
18. | Tony Chor | Case Study: The Secure Development Lifecycle and Internet Explorer 7 | Black Hat USA 2006 | |
19. | Cold War Kids | Against Privacy | Loyalty to Loyalty | |
20. | David Fraser | Privacy | Definitely Not The Opera (CBC) | |
21. | The Beloved | Privacy | | |
22. | Steve Rambam | Privacy - Not What It Used To Be | The Fifth HOPE | |
23. | Cold War Kids | Against Privacy | Loyalty To Loyalty | |
24. | Ask Leo! | Privacy? What Privacy? | Ask Leo! | |
25. | Cold War Kids | 01 Against Privacy.mp3 | Loyalty To Loyalty | |
26. | The Beloved | Privacy | | |
27. | Aldert Hazenberg, Paul Wouters | Privacy through Technology: A | HOPE Number Six, 21-23 July 2006 | |
28. | Holly Penfield | Parts Of My Privacy | | |
29. | Missing Foundation | Invasion of Yr Privacy | Hungryeyerecords.com | |
30. | Pete Hickey | Privacy: Yours, Mine, and Theirs | Access Conference Ottawa Ontario | |