ID | Interpret | Skladba | Album | |
151. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
152. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
153. | http://www.mckeay.net | Network Security Podcast - Alex Neihaus Astaro Security | Martin McKeay | |
154. | Steve Gibson with Leo Laporte | Security Now103: Paypal Security Key - sponsored by Astaro Corp. | Security Now August 2007 | |
155. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
156. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
157. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
158. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
159. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 105 - New Directions and Innovations in Metrics-Based Management | The PMO Podcast | |
160. | Steve Gibson with Leo Laporte | Security Now 66: Vista Security - Sponsored by Astaro Corp. | Security Now November 2006 | |
161. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
162. | Steve Gibson with Leo Laporte | Security Now 52: Security Bulletins - Sponsored by Astaro Corp. | Security Now August 2006 | |
163. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
164. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
165. | Steve Gibson with Leo Laporte | Security Now 65: Why Is Security So Difficult? - Sponsored by Astaro Corp. | Security Now November 2006 | |
166. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request | CERT's Podcasts for Business Leaders | |
167. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 3: Competitive Advantage, Duty of Care, and Who's Responsible? | CERT Podcasts for Business Leaders | |
168. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
169. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
170. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
171. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 1: An Introduction to National CSIRTs | CERT’s Podcasts for Business Leaders | |
172. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
173. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
174. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
175. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
176. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
177. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | CERT’s Podcasts for Business Leaders | |
178. | Julia Allen | Getting Real about Security Governance - Part 2: A Guide to Effective Governance | CERT’s Podcasts for Business Leaders | |
179. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 1: What Is Convergence and Why Is It Important? | CERT’s Podcasts for Business Leaders | |
180. | CMC Media | CM Today Includes Synchronizing BOM Configurations Across Product Lifecycle Helps Manufacturers Hit Metrics Driving | | |