ID | Interpret | Skladba | Album | |
31. | Doug Mueller | Lower Service Support Costs and Increase Business Value Through a Holistic Approach: Doug Mueller,Chief Technology Officer in the Service Management Business Unit of BMC Software | TalkBMC Podcast | |
32. | Craig Shoemaker | Business Lessons from a Software Developer : Interview with Rob Howard | Polymorphic Podcast :: polymorphicpodcast.com | |
33. | Editorial Team | Software Quality Assurance in a Data Warehouse/Business Intelligence Environment | 6181 | |
34. | MacKenzie Smith and Ellen Duranceau | MacKenzie Smith on Endnote vs. Zotero: the Business End of Citation Management Software | MIT Libraries - Podcasts on Scholarly Publishing | |
35. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
36. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
37. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
38. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
39. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | CERT’s Podcasts for Business Leaders | |
40. | Adam Tonkin, Solutions Architect, Enspiria Solutions | Enspiria Solutions Ties Together ESRI’s GIS Software and Microsoft Business Intelligence Tools to Create a Spatially-Enabled Utilities Executive Dashboard | ESRI Speaker Series | |
41. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
42. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
43. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
44. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
45. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
46. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
47. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
48. | Betsy Nichols | Building a Security Metrics Program - Part 3: Challenges and Getting Started | CERT’s Podcasts for Business Leaders | |
49. | Barbara Laswell | Building Staff Competence in Security - Part 2: What Skills Should a Hiring Manager Look For? | CERT Podcasts for Business Leaders | |
50. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
51. | Barbara Laswell | Building Staff Competence in Security - Part 1: Identify and Match Required Competencies to Roles | CERT Podcasts for Business Leaders | |
52. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
53. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
54. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
55. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
56. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 2: How To Help Ensure Graduates Are Successful | CERT’s Podcasts for Business Leaders | |
57. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
58. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
59. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 1: Nuts and Bolts versus the Big Picture | CERT’s Podcasts for Business Leaders | |
60. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |