ID | Interpret | Skladba | Album | |
61. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
62. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
63. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
64. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
65. | AudioBerkman | Derek Bambauer on Software Security and the Law | | |
66. | Bob Charette | Is There Value in Identifying Software Security Never Events? | CERT's Podcasts for Business Leaders | |
67. | Jon Udell, Andy Singleton | Jon Udell talks with Andy Singleton about building global software teams | A conversation with Andy Singleton about building global teams | |
68. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
69. | Steve Gibson with Leo Laporte | Security Now 93: Software Patents - Sponsored by Astaro Corp. | Security Now May 2007 | |
70. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
71. | Doug Mueller | Lower Service Support Costs and Increase Business Value Through a Holistic Approach: Doug Mueller,Chief Technology Officer in the Service Management Business Unit of BMC Software | TalkBMC Podcast | |
72. | Craig Shoemaker | Business Lessons from a Software Developer : Interview with Rob Howard | Polymorphic Podcast :: polymorphicpodcast.com | |
73. | MacKenzie Smith and Ellen Duranceau | MacKenzie Smith on Endnote vs. Zotero: the Business End of Citation Management Software | MIT Libraries - Podcasts on Scholarly Publishing | |
74. | Editorial Team | Software Quality Assurance in a Data Warehouse/Business Intelligence Environment | 6181 | |
75. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
76. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
77. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
78. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | CERT’s Podcasts for Business Leaders | |
79. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
80. | Adam Tonkin, Solutions Architect, Enspiria Solutions | Enspiria Solutions Ties Together ESRI’s GIS Software and Microsoft Business Intelligence Tools to Create a Spatially-Enabled Utilities Executive Dashboard | ESRI Speaker Series | |
81. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
82. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
83. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
84. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
85. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
86. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
87. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
88. | Betsy Nichols | Building a Security Metrics Program - Part 3: Challenges and Getting Started | CERT’s Podcasts for Business Leaders | |
89. | Barbara Laswell | Building Staff Competence in Security - Part 2: What Skills Should a Hiring Manager Look For? | CERT Podcasts for Business Leaders | |
90. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |