ID | Interpret | Skladba | Album | |
61. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
62. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
63. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
64. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
65. | Gary McGraw | How to Start a Secure Software Development Program | CERT’s Podcasts for Business Leaders | |
66. | Dawn Cappelli | Protecting Against Insider Threat - Part 1: The Threat | CERT Podcasts for Business Leaders | |
67. | Keith Elder and Chris Woodruff | Episode 16: Discussions about Gnome, Linux and Software Development with Luis Villa | Deep Fried Bytes | |
68. | CMC Media | CM Today Includes Electric Cloud and ReleaseTEAM Partner to Deliver Software Development Optimization | | |
69. | Dawn Cappelli | Protecting Against Insider Threat - Part 2: Warning Signs | CERT Podcasts for Business Leaders | |
70. | Greg Newby | The Human Side of Security Trade-Offs - Part 1: Raising Awareness and Motivation | CERT’s Podcasts for Business Leaders | |
71. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
72. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
73. | Host Dale Kutnick and Juergen Weiss | Software as a Service for Life Insurers | Gartner Voice | |
74. | Peter Kay | Use Project software to manage your life | YourComputerMinute.Com Tips | |
75. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
76. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
77. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
78. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
79. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
80. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
81. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
82. | Dawn Cappelli | Protecting Against Insider Threat | CERT Podcasts for Business Leaders | |
83. | Radio E | Development in Istanbul threat | Network Europe | |
84. | The Alternative Information Center (AIC) | News from Within Podcast: Zochrot—Raising Awareness Within Israeli Society About the Nakba | News from Within: Palestine/Israel Podcast | |
85. | Chet Marchwinski, Durward Sobek, Associate Professor, Graduate Program Coordinator of Mechanical and Industrial Engineering at Montana State University | Lean Product and Process Development | Lean Enterprise Institute | |
86. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
87. | Dr. Timothy Chou | The End of Software | | |
88. | Creutzfeld & Jakob | Software | Gottes Werk und Creutzfelds Be | |
89. | The Parody Bits | Software Free | Live @ Visit Days 2009 | |
90. | Jay Elliott | Migo Software | Castellini on Computers | |