ID | Interpret | Skladba | Album | |
61. | Elder Richard G. Scott | The Atonement Can Secure Your Peace and Happiness | Oct 2006 General Conference: Saturday Afternoon Session | |
62. | Robert Seacord | Mainstreaming Secure Coding Practices | CERT's Podcasts for Business Leaders | |
63. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
64. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
65. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
66. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
67. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
68. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
69. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
70. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
71. | Bryan MS | Establishing a Secure and Manageable Messaging Infrastructure | | |
72. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
73. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
74. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
75. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
76. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
77. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
78. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
79. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
80. | Bryan MS | TechNet Webcast: Secure Messaging with Microsoft Antigen (Level | | |
81. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
82. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
83. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
84. | Aaron; Sandy Sharma | Planning and Deploying a Secure Messaging Solution with Exchange Server 2007 | | |
85. | Ragib Hasan | The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance | FAST '09 | |
86. | Freedom Scientific | September 2009 - More JAWS 11; Research It; Secure Braille Driver Initiative; Jim Ellsworth | FSCast | |
87. | DonJuan Fontaine | Theory In Development | Microphone Matrimony | |
88. | Paul Cammack and Ben Selwyn | Capitalism and Development | Political Economy Day School | |
89. | Stephen Fry | Arrested Development | Moab Is My Washpot [Disc 3] | |
90. | US Institute of Peace | Securing Development | Passing the Baton 2009 | |