ID | Interpret | Skladba | Album | |
61. | INSEAD | INSEAD Knowledgecast n°14: Predicting IPO Failure: how to evaluate the risk that a newly public company will fail | INSEAD Knowledgecast | |
62. | Heather Roberts, Client Relations Manager, National Business | Running on Schedule - Maintaining your business relationship and managing the project | Hot Topic Conversations | |
63. | Small Business Radio | Building A Successful Business | BlogTalkRadio.com | |
64. | Business Intelligence Network | Building Better Business Intelligence | Audio Article | |
65. | Cedric Muhammad | A Thank You to the Fisrt Lady of Business and Building - Stefanie | Black Coffee Channel - Classic Moments | |
66. | Jacob Hodgson | Building Your Business in Tough Economic Times | Access Marketing & Fearless Income Building Podcast | |
67. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes | CERT's Podcasts for Business Leaders | |
68. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
69. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
70. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
71. | Allan Folting | MSDN Webcast: Building Business Intelligence Solutions Using Office Excel 2007 and SQL Server 2005 Analysis Services | | |
72. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
73. | Editorial Team | Achieving Business Intelligence Impact: Integrating Business Intelligence with Core Business Processes | 6283 | |
74. | US Institute of Peace | Securing Development | Passing the Baton 2009 | |
75. | College Answer Guy | Securing Scholarships | College Answer Guy | |
76. | Erich Gliebe | Securing a White Homeland | American Dissident Voices | |
77. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
78. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
79. | Adam Graham | The Vital Nature of Securing the Border | | |
80. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
81. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
82. | Host Chris Byrnes and Guest Eric Ouellet | Securing Data Through Email Encryption | Gartner Voice | |
83. | Rich Cannings | Android: Securing a Mobile Platform from the Ground Up | Security 09 | |
84. | PGP Corporation | Securing Laptop Computers at Baylor University | PGP® Security Podcasts | |
85. | ABC Local Radio | John Dwyer, securing Jerry Seinfeld for the ad | Coast Breakfast with Peter Scott | |
86. | AudioBerkman | Ron Deibert on Securing Human Rights Online | Berkman Center for Internet & Society | |
87. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
88. | Chris Gradwohl | TechNet Webcast: Securing Active Directory | | |
89. | Arketi Group | Selling Tips for Business-to-Business Tech Businesses to Consider: An Interview with Douglas Rodgers | B2B Marketing Minute | |
90. | Arketi Group | Selling Tips for Business-to-Business Tech Businesses to Consider: An Interview with Douglas Rodgers | B2B Marketing Minute | |