ID | Interpret | Skladba | Album | |
91. | Barbara Laswell | Building Staff Competence in Security - Part 1: Identify and Match Required Competencies to Roles | CERT Podcasts for Business Leaders | |
92. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
93. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
94. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
95. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
96. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
97. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 2: How To Help Ensure Graduates Are Successful | CERT’s Podcasts for Business Leaders | |
98. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
99. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 1: Nuts and Bolts versus the Big Picture | CERT’s Podcasts for Business Leaders | |
100. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
101. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
102. | Dr. Timothy Chou | The End of Software | | |
103. | Creutzfeld & Jakob | Software | Gottes Werk und Creutzfelds Be | |
104. | Jay Elliott | Migo Software | Castellini on Computers | |
105. | Jay Elliott | Migo Software | Castellini on Computers | |
106. | Jay Elliott | Migo Software | Castellini on Computers | |
107. | Rev. Jeff Miner | Software Upgrade | | |
108. | RAIDERS OF THE LOST ARP | Software Creations | Tema5 | |
109. | ILLEKTROLAB | Internal Software | System Check EP | |
110. | dr.squ | Software Song 2 | Synthdemos @ deepsonic.ch | |
111. | Daddyo | Little Shop of Software | | |
112. | MFG Baden-Württemberg | 04 / Social Software | MFG Innovationcast | |
113. | Jay Elliott | Migo Software | Castellini on Computers | |
114. | Antonio Quirarte y Juan Ramón Ruelas | 28) Software Guru | Eon 4.5 | |
115. | Antonio Quirarte y Juan Ramón Ruelas | 28) Software Guru | Eon 4.5 | |
116. | TextAloud: NeoSpeech Paul 16k | launching software.mp3 | Created: 7/22/2005 3:14:53 PM | |
117. | The Parody Bits | Software Free | Live @ Visit Days 2009 | |
118. | Inside Digital Media with Phil Leigh | Software-as-a-Service | Inside Digital Media with Phil Leigh | |
119. | Business Intelligence Network | Why Buy Proprietary Software? | Audio Article | |
120. | Directions Media | Safe Software at 13 | | |