ID | Interpret | Skladba | Album | |
61. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
62. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
63. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
64. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
65. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
66. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
67. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
68. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
69. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
70. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
71. | Eric Rescorla, RTFM, Inc. | Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | |
72. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | CERT's Podcasts for Business Leaders | |
73. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
74. | Ambassador Marc Perrin de Brichambaut | The Organization for Security and Co-operation in Europe: Why it matters to the Asia-Pacific | Distinguished Speaker Series | |
75. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
76. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
77. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
78. | Alex - Webcast Team | TechNet Webcast Audio: Managing Exchange Server and SharePoint Protection with Forefront Server Security Management Console | | |
79. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
80. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
81. | Galen Smith | Naturalism, a Science-based Alternative to Faith-based Religions | Humanist Union of Madison | |
82. | Chris May | Better Incident Response through Scenario-Based Training - Part 1: Train as You Fight: Use Scenario-Based Exercises | CERT's Podcasts for Business Leaders | |
83. | Kent Bottles, MD and Paul Keckley, PhD | Evidence-Based Medicine with Paul H. Keckley,PhD and Exec. Director of The Vanderbilt Center for Evidence-Based Medicine | The Journal of Medical Practice Management | |
84. | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze | Law Enforcement Wiretaps: Background and Vulnerabilities | HOPE Number Six, 21-23 July 2006 | |
85. | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze | Law Enforcement Wiretaps: Background and Vulnerabilities | HOPE Number Six, 21-23 July 2006 | |
86. | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze | Law Enforcement Wiretaps: Background and Vulnerabilities | HOPE Number Six, 21-23 July 2006 | |
87. | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze | Law Enforcement Wiretaps: Background and Vulnerabilities | HOPE Number Six, 21-23 July 2006 | |
88. | Micah Sherr, Eric Cronin, Sandy Clark, Matt Blaze | Law Enforcement Wiretaps: Background and Vulnerabilities | HOPE Number Six, 21-23 July 2006 | |
89. | Finux | Moxie Marlinspike talks about vulnerabilities in common SSL deployment | Hacker Public Radio | |
90. | Steve Gibson with Leo Laporte | Security Now 91: Marc Maiffret of eEye Digital Security - sponsored by Astaro Corp. | Security Now May 2007 | |