ID | Interpret | Skladba | Album | |
61. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
62. | http://www.mckeay.net | Network Security Podcast - Alex Neihaus Astaro Security | Martin McKeay | |
63. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 2: Why Is Security a Governance Issue? | CERT Podcasts for Business Leaders | |
64. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
65. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
66. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
67. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
68. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
69. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
70. | Steve Gibson with Leo Laporte | Security Now 65: Why Is Security So Difficult? - Sponsored by Astaro Corp. | Security Now November 2006 | |
71. | Steve Gibson with Leo Laporte | Security Now 66: Vista Security - Sponsored by Astaro Corp. | Security Now November 2006 | |
72. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
73. | Steve Gibson with Leo Laporte | Security Now 52: Security Bulletins - Sponsored by Astaro Corp. | Security Now August 2006 | |
74. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
75. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
76. | Steve Gibson with Leo Laporte | Security Now 179: Cracking Security Certificates | Security Now January 2009 | |
77. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
78. | DJ Peter T | Computer | ccMixter | |
79. | Bios | Der Computer Nr 3 | Maxi Dance Sensation Vol.21 | |
80. | eli & mala | Q come computer | pigreco party | |
81. | Stephanie Schulz , Christian Geisler, Reinhard Brock | Computer | KONZ AUDIO TOP 15 | |
82. | Igor | I want to be a computer | | |
83. | The Human League | Don't You Want Me? (Computer C | Hejven.se | |
84. | Chris Freeman | Computer On | | |
85. | Bukola | Computer | Which Way | |
86. | To My Boy | Tell Me, Computer | Messages | |
87. | Three Dead Trolls in a Baggie | How to Buy a Computer! | | |
88. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 1: Why Should Leaders Care About Security? | CERT Podcasts for Business Leaders | |
89. | Little Computer People | Little Computer People | Little Computer People | |
90. | Little Computer People | Little Computer People | This Is Not The 80s - A Nu-Wave Electro Compilation | |