ID | Interpret | Skladba | Album | |
91. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
92. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
93. | Bryan MS | Establishing a Secure and Manageable Messaging Infrastructure | | |
94. | Jay Wilson | James 1:19-25 Move from Fleshly Minded to Spiritually Minded | Sermons from James | |
95. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
96. | Tony Chor | Case Study: The Secure Development Lifecycle and Internet Explorer 7 | Black Hat USA 2006 | |
97. | Bryan MS | TechNet Webcast: Secure Messaging with Microsoft Antigen (Level | | |
98. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
99. | Aaron; Sandy Sharma | Planning and Deploying a Secure Messaging Solution with Exchange Server 2007 | | |
100. | Ragib Hasan | The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance | FAST '09 | |
101. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
102. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
103. | Freedom Scientific | September 2009 - More JAWS 11; Research It; Secure Braille Driver Initiative; Jim Ellsworth | FSCast | |
104. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
105. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
106. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
107. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
108. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
109. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |