ID | Interpret | Skladba | Album | |
181. | Crucial Unit | Thrashin Is Our Business and Business is Mediocre At Best - Crucial Unit Theme Song | Premium Iced Tea 7 | |
182. | Crucial Unit | Thrashin Is Our Business and Business is Mediocre At Best - Crucial Unit Theme Song | Premium Iced Tea 7 | |
183. | Verizon Business | Verizon Business Helps Companies Conduct Eco-Friendly Business | | |
184. | Paige ChickiChicki Eissinger and Kim Beasley, The Blog Queen | Business Trending 2009: Incorporating Social Media into Your Business | Views from the Coop: Episode 80 | |
185. | hector milia | DQ P- An Index of Hours | hector milia's Album | |
186. | Mark EG Chrissi | 'Multiple Index' | | |
187. | el Zeratulo | Hot Index Ice Bar Evening | SPLUNK! | |
188. | Grover Washington Jr. | Heat Index | Prime Cuts: The Columbia Years | |
189. | artist | A 100 Heat Index | No Ending | |
190. | Bruce Andrews | Index to You Made | SUNY Buffalo / April 15, 1992 | |
191. | Discordance Axis | Vertigo Index | Jou Hou | |
192. | Christina Feldman | 1987-08/03 Integrating Spirit | Insight Meditation Society - Retreat Center http://dharma.org | |
193. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 3: Competitive Advantage, Duty of Care, and Who's Responsible? | CERT Podcasts for Business Leaders | |
194. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 2: Benchmarking Challenges and Some Works In Progress | CERT’s Podcasts for Business Leaders | |
195. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
196. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
197. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy | CERT's Podcasts for Business Leaders | |
198. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
199. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
200. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 1: An Introduction to National CSIRTs | CERT’s Podcasts for Business Leaders | |