ID | Interpret | Skladba | Album | |
181. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
182. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
183. | President George W. Bush | President Bush Attends White House Summit on Inner-City Children and Faith-Based Schools - April 24, 2008 | Presidential Speeches & Remarks | |
184. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
185. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
186. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
187. | Eric James Wolf | SWC #039 Steve Denning - The Knowledge based organization: using stories to embody and transfer knowledge. | The Art of Storytelling with Childen Podcast | |
188. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
189. | Thorsten Holz, University of Mannheim; Moritz Steiner, University of Mannheim and Institut Eurécom; Frederic Dahl, University of Mannheim; Ernst Biersack, Institut Eurécom; Felix Freiling, University | Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | | |
190. | Thorsten Holz, University of Mannheim; Moritz Steiner, University of Mannheim and Institut Eurécom; Frederic Dahl, University of Mannheim; Ernst Biersack, Institut Eurécom; Felix Freiling, University | Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | | |
191. | Intel Chip Chat - Powered by Connected Social Media | Intel Atom Processor-based Home Servers - Intel Chip Chat - Episode 54 | Intel Chip Chat - Powered by Connected Social Media | |
192. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: Flash-based laptops reviewed; storage power savings in the data center | | |
193. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
194. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
195. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
196. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
197. | Chris May | Better Incident Response through Scenario-Based Training - Part 2: Training Geographically Distributed Teams: CERT’s XNET | CERT's Podcasts for Business Leaders | |
198. | Daniel H. Foster | The Theater of the Mind 11: Overture to BenitoCereno-This overture is based on the first few pages of description in Herman Melville’s novella, Benito Cereno. | | |
199. | Daniel H. Foster | The Theater of the Mind 11: Overture to BenitoCereno-This overture is based on the first few pages of description in Herman Melville’s novella, Benito Cereno. | | |
200. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: DNA-based data storage; Carnegie-Mellon study casts doubt on vendor disk claims | | |