ID | Interpret | Skladba | Album | |
121. | Coy,Bob | Safe,Secure And Going To Hell | firefighters.org | |
122. | Building Block Christian Faith | Secure Forever! How Should We Behave? | AFA Vol. 1 Number 1 | |
123. | Host Dale Kutnick and Guest Amrit Williams | Developing Secure Applications | Gartner Voice | |
124. | Julia Allen | Building More Secure Software | CERT's Podcasts for Business Leaders | |
125. | Brian Fisher | Not Safe But Secure: Respondin | �2005 Grace Bible Church, Coll | |
126. | J. Salvatore Testa II | Proactively Secure Programming | HOPE Number Six, 21-23 July 2006 | |
127. | Building Block Christian Faith | Can I Lose My Salvation? Secure Forever! | AFA Vol. 1 Number 1 | |
128. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
129. | Elder Richard G. Scott | The Atonement Can Secure Your Peace and Happiness | Oct 2006 General Conference: Saturday Afternoon Session | |
130. | Cathy Horton and Dan Hanson | Secure profession without college degee | The Great Lakes Geek Show | |
131. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
132. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
133. | Robert Seacord | Mainstreaming Secure Coding Practices | CERT's Podcasts for Business Leaders | |
134. | Pastor Bob W. Smith | Financially Secure And Spiritually Bankrupt [08-21-05 SUN AM] | Trinity Baptist Church, Arlington, TX | |
135. | Highview Baptist Church - Fegenbush Campus Audio Podcast | How To Make A Secure Investment - Matthew 19:16-30 | Highview Baptist Church - Fegenbush Campus Audio Podcast | |
136. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
137. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
138. | Building Block Christian Faith | Can I Lose My Salvation? Secure Forever! | AFA Vol. 1 Number 1 | |
139. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
140. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
141. | Gary McGraw | How to Start a Secure Software Development Program | CERT’s Podcasts for Business Leaders | |
142. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
143. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
144. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
145. | Tony Chor | Case Study: The Secure Development Lifecycle and Internet Explorer 7 | Black Hat USA 2006 | |
146. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
147. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
148. | Massive Attack | Exchange | Mezzanine | |
149. | Massive Attack | Exchange | Mezzanine | |
150. | Massive Attack | Exchange | Mezzanine | |