ID | Interpret | Skladba | Album | |
121. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
122. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
123. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
124. | MANDY feat. BOOKA SHADE | body language (physical - Body language (physical music mix) | | |
125. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
126. | Steve Gibson with Leo Laporte | Security Now 66: Vista Security - Sponsored by Astaro Corp. | Security Now November 2006 | |
127. | Steve Gibson with Leo Laporte | Security Now 52: Security Bulletins - Sponsored by Astaro Corp. | Security Now August 2006 | |
128. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
129. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
130. | Steve Gibson with Leo Laporte | Security Now 65: Why Is Security So Difficult? - Sponsored by Astaro Corp. | Security Now November 2006 | |
131. | Standing Waves | Integrating Circuits | Integrating Circuits 7 | |
132. | Deadline | Convergence | skrm006: Flower | |
133. | Brian Wilbur Grundstrom | Convergence | www.brianwilbur.com | |
134. | Cold Chorus | Convergence 01 | | |
135. | Alfred R | Convergence | Wide EP | |
136. | Brendan Riley | Convergence | Writing and Rhetoric 2: Online | |
137. | Brendan Riley | Convergence | Writing and Rhetoric 2: Online | |
138. | Christina Feldman | 1987-08/03 Integrating Spirit | Insight Meditation Society - Retreat Center http://dharma.org | |
139. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 3: Competitive Advantage, Duty of Care, and Who's Responsible? | CERT Podcasts for Business Leaders | |
140. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
141. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 2: Benchmarking Challenges and Some Works In Progress | CERT’s Podcasts for Business Leaders | |
142. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
143. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy | CERT's Podcasts for Business Leaders | |
144. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
145. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
146. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
147. | Tech Writer Voices, Tom Johnson | Help 2.0 -- The Convergence of Web 2.0 with Help Documentation | Suncoast Chapter, STC | |
148. | Dimension 5 | Harmonic Convergence | Destination Goa 4 | |
149. | Wilt | Harmonic Convergence | Dark Meadows | |
150. | True Convergence | True Convergence | True Convergence | |