ID | Interpret | Skladba | Album | |
61. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
62. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
63. | AudioBerkman | Derek Bambauer on Software Security and the Law | | |
64. | Bob Charette | Is There Value in Identifying Software Security Never Events? | CERT's Podcasts for Business Leaders | |
65. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
66. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
67. | Steve Gibson with Leo Laporte | Security Now 93: Software Patents - Sponsored by Astaro Corp. | Security Now May 2007 | |
68. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
69. | K@W BCG | BCG-K@W Procurement Report: Part 3 -- Global Supply Chain Strategy | Procurement | |
70. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
71. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
72. | Host Dale Kutnick and Guest Amrit Williams | Developing Secure Applications | Gartner Voice | |
73. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
74. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
75. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
76. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
77. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
78. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
79. | WCC Genesys North America | Global Supply Chain Visibility | | |
80. | WCC Genesys North America | Global Supply Chain Visibility | WCC Genesys North America | |
81. | Dr. A.K. Pradeep | Supply Chain Infrastructure: Blogs and RSS | | |
82. | Voices in Business Sun Microsystems | PP009 - The Financial Supply Chain | The Payments Podcast | |
83. | Bized In The News | Biz/ed In The News - 20 April 2006 - Supply Chain | | |
84. | Oracle Corporation | Green Initiatives in the Reverse Supply Chain | Enabling The Eco-Enterprise | |
85. | Business Intelligence Network | EPCIS: Supply Chain Visibility and Business Intelligence | Audio Article | |
86. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
87. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
88. | Network World Staff | Gloomy future for ISPs; 3Com taps Nortel exec to run supply chain | Network World 360 | |
89. | Creutzfeld & Jakob | Software | Gottes Werk und Creutzfelds Be | |
90. | Dr. Timothy Chou | The End of Software | | |