ID | Interpret | Skladba | Album | |
91. | Gary Hinson | Getting in Front of Social Engineering - Part 2: Identifying Social Engineering Attempts and Attacks | CERT's Podcasts for Business Leaders | |
92. | Adam Bomb | Using Service Manager with Operations Manager | Using Service Manager with Operations Manager | |
93. | Jon Udell, Bob Glushko | A conversation with Bob Glushko about document engineering and business patterns | Interviews with Innovators: Jon Udell's Friday Podcasts | |
94. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
95. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
96. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
97. | Interview with Mary Foster, Coalition Justice For Adil Charkaoui | Bill C3: Security Certificate Special Advocate Model | Interview | |
98. | Interview with Mary Foster, Coalition Justice For Adil Charkaoui | Bill C3: Security Certificate Special Advocate Model | Interview | |
99. | Marcus Borg and John Dominic Crossan | Jesus and Paul: Continuity or Discontinuity? Part Four | Jesus and Paul: Continuity or Discontinuity? | |
100. | Marcus Borg and John Dominic Crossan | Jesus and Paul: Continuity or Discontinuity? Part Four | Jesus and Paul: Continuity or Discontinuity? | |
101. | Carol Wilson and The Yankee Group's Tara Howard | A Telephony Podcast: Advertising and the IPTV Business Model | Telephony Podcasts | |
102. | Carol Wilson and The Yankee Group's Tara Howard | A Telephony Podcast: Advertising and the IPTV Business Model | Telephony Podcasts | |
103. | Tracey Webcast Team | IT Manager Webcast Audio: Visualize Data with System Center Operations Manager, System Center Configuration Manager Add-Ins for Visio 2007 | | |
104. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
105. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 2: Selling Security and Pinpointing Acceptable Risk | CERT's Podcasts for Business Leaders | |
106. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | CERT’s Podcasts for Business Leaders | |
107. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
108. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
109. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 2: Why Is Security a Governance Issue? | CERT Podcasts for Business Leaders | |
110. | Joe Kennedy | Chapter 2 Part 2, Legal Forms of Business Ownership from The Small Business Owners Manual | The Small Business Owners Manual | |
111. | Joe Kennedy | Chapter 2 Part 4, Legal Forms of Business Ownership, from The Small Business Owners Manual | The Small Business Owners Manual | |
112. | Joe Kennedy | Chapter 2 Part 3, Legal Forms of Business Ownership, from The Small Business Owners Manual | The Small Business Owners Manual | |
113. | Eddie Goldman | NO HOLDS BARRED: Is the Pay-Per-View TV Business Model Dead? Mark Taffet and Jacqui Snow | NO HOLDS BARRED | |
114. | Jorge Aristizábal | Introducing Business Ready Security | Introducing Business Ready Security | |
115. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs | CERT’s Podcasts for Business Leaders | |
116. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security | CERT's Podcasts for Business Leaders | |
117. | David Tesar | Forefront Protection 2010 for Exchange and Business Ready Security | Forefront Protection 2010 for Exchange and Business Ready Security | |
118. | Gary Hinson | Getting in Front of Social Engineering - Part 1: Why We're Susceptible | CERT's Podcasts for Business Leaders | |
119. | Gary Hinson | Getting in Front of Social Engineering - Part 3: Detective, Corrective, and Preventive Actions | CERT's Podcasts for Business Leaders | |
120. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |