ID | Interpret | Skladba | Album | |
121. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
122. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
123. | Building Block Christian Faith | Can I Lose My Salvation? Secure Forever! | AFA Vol. 1 Number 1 | |
124. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
125. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
126. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
127. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
128. | Robert Seacord | Mainstreaming Secure Coding Practices | CERT's Podcasts for Business Leaders | |
129. | Highview Baptist Church - Fegenbush Campus Audio Podcast | How To Make A Secure Investment - Matthew 19:16-30 | Highview Baptist Church - Fegenbush Campus Audio Podcast | |
130. | Gene S. | AMIR Crackpot Index: Alternative Medicine Version | http://www.theshallowgenepool.com/podcast amir.htm | |
131. | Chris Scott | 150 UK Wine Show 150 Kive-ex and index with James Miles | UK Wine Show | |
132. | Chris Scott | 150 UK Wine Show 150 Kive-ex and index with James Miles | UK Wine Show | |
133. | Alex Wunschel | Blick 151 auf ÖVP iReport : Social Media Index : Köbberling | Tellerrand | |
134. | Gene S. | AMIR Crackpot Index: Alternative Medicine Version | http://www.theshallowgenepool.com/podcast amir.htm | |
135. | Mark Yeandle interviewed by Alexander Osterwalder | Mark Yeandle on the Global Financial Centres Index | podcast series privatebankinginnovation.com | |
136. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
137. | Bryan MS | Establishing a Secure and Manageable Messaging Infrastructure | | |
138. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
139. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
140. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
141. | METAL Injection Guerilla Radio: The Entropy League | Neaera / Slayer / Misery Index / The Absence / God Dethroned / Cryptopsy / Dragonlord | Episode 54: Absent | |
142. | Dj.Gonzales | Retro Classics MINDEN SZOMBATON AZ INDEX CAFEBAN V�RUNK NY�REGYH�Z�N! | | |
143. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
144. | Bryan MS | TechNet Webcast: Secure Messaging with Microsoft Antigen (Level | | |
145. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
146. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
147. | Various Speakers | Conflict Prevention and Resolution Forum: The Global Peace Index: Its Value and Implications, and the Next Steps | Johns Hopkins SAIS Events - Summer 2007 | |
148. | Alex Wunschel | Blick 178 ARD-ZDF-Onlinestudie, Playboy-Verlosung, Twitter Brand Index und Facebook-Gangster | Tellerrand | |
149. | Aaron; Sandy Sharma | Planning and Deploying a Secure Messaging Solution with Exchange Server 2007 | | |
150. | Ragib Hasan | The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance | FAST '09 | |