ID | Interpret | Skladba | Album | |
31. | Kelly D. Brownell, David S. Ludwig | The Rudd Report: The Glycemic Index | Yale University | |
32. | Dive Index | Dive Index: Sole Fisherman | Insomnia Radio: Daily Dose | |
33. | Bloomberg News: Financial Markets, World Economies, Investing and Business | Volatility Index Rises 13.5% to Close at 18.89 | ((The Final Word)) Volatility Report | |
34. | Business Intelligence Network | Gauging Your Firm's Leadership Culture Index | Audio Article | |
35. | Chris Scott | 150 UK Wine Show 150 Kive-ex and index with James Miles | UK Wine Show | |
36. | Gene S. | AMIR Crackpot Index: Alternative Medicine Version | http://www.theshallowgenepool.com/podcast amir.htm | |
37. | Alex Wunschel | Blick 151 auf ÖVP iReport : Social Media Index : Köbberling | Tellerrand | |
38. | Gene S. | AMIR Crackpot Index: Alternative Medicine Version | http://www.theshallowgenepool.com/podcast amir.htm | |
39. | Mark Yeandle interviewed by Alexander Osterwalder | Mark Yeandle on the Global Financial Centres Index | podcast series privatebankinginnovation.com | |
40. | Chris Scott | 150 UK Wine Show 150 Kive-ex and index with James Miles | UK Wine Show | |
41. | METAL Injection Guerilla Radio: The Entropy League | Neaera / Slayer / Misery Index / The Absence / God Dethroned / Cryptopsy / Dragonlord | Episode 54: Absent | |
42. | Dj.Gonzales | Retro Classics MINDEN SZOMBATON AZ INDEX CAFEBAN V�RUNK NY�REGYH�Z�N! | | |
43. | Various Speakers | Conflict Prevention and Resolution Forum: The Global Peace Index: Its Value and Implications, and the Next Steps | Johns Hopkins SAIS Events - Summer 2007 | |
44. | Alex Wunschel | Blick 178 ARD-ZDF-Onlinestudie, Playboy-Verlosung, Twitter Brand Index und Facebook-Gangster | Tellerrand | |
45. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
46. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
47. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
48. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
49. | Carl Franklin and Richard Campbell | .NET Rocks! #460 - Scott Ambler on the Agile Process Maturity Model Part B | .NET Rocks! | |
50. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
51. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | CERT's Podcasts for Business Leaders | |
52. | Greg Newby | The Human Side of Security Trade-Offs - Part 1: Raising Awareness and Motivation | CERT’s Podcasts for Business Leaders | |
53. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | CERT's Podcasts for Business Leaders | |
54. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
55. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
56. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
57. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
58. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
59. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
60. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |