ID | Interpret | Skladba | Album | |
31. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
32. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
33. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
34. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
35. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
36. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
37. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
38. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
39. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
40. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
41. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
42. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
43. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
44. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
45. | Chris May | Better Incident Response through Scenario-Based Training - Part 1: Train as You Fight: Use Scenario-Based Exercises | CERT's Podcasts for Business Leaders | |
46. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
47. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
48. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
49. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
50. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
51. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
52. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
53. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
54. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
55. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
56. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
57. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
58. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
59. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
60. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 2: Determining How Much Is Enough | CERT's Podcasts for Business Leaders | |