ID | Interpret | Skladba | Album | |
61. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
62. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
63. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
64. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
65. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
66. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
67. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
68. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
69. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
70. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
71. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
72. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
73. | Eric Rescorla, RTFM, Inc. | Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | |
74. | Gerry Andersen | The World's Worst Building Program | Genesis 11:1-9 | |
75. | Barbara Laswell | Building Staff Competence in Security | CERT Podcasts for Business Leaders | |
76. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
77. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 2: Why Is Security a Governance Issue? | CERT Podcasts for Business Leaders | |
78. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
79. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
80. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
81. | Editorial Team | How to Increase Your Performance Management Risk, Part 3 | | |
82. | Business Intelligence Network | How to Increase Your Performance Management Risk, Part 2 | Audio Article | |
83. | David and Sally Michael - Bethlehem Baptist Church | 070408: Christ-Based Parenting: Part 1 | | |
84. | David and Sally Michael, Bethlehem Baptist Church | 070408: Christ-Based Parenting: Part 2 | | |
85. | Galen Smith | Naturalism, a Science-based Alternative to Faith-based Religions | Humanist Union of Madison | |
86. | Chris Alberts | Rethinking Risk Management - Part 3: Dealing with Preventable Failures | CERT's Podcasts for Business Leaders | |
87. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 2: Determining How Much Is Enough | CERT's Podcasts for Business Leaders | |
88. | Chris Alberts | Rethinking Risk Management - Part 1: Why Traditional Approaches Fall Short | CERT's Podcasts for Business Leaders | |
89. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 058 - Recommendations for Informal Projects Part IV, Simple Risk Management | | |
90. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 058 - Recommendations for Informal Projects Part IV, Simple Risk Management | | |