ID | Interpret | Skladba | Album | |
61. | AudioBerkman | Derek Bambauer on Software Security and the Law | | |
62. | Steve Gibson with Leo Laporte | Security Now 93: Software Patents - Sponsored by Astaro Corp. | Security Now May 2007 | |
63. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
64. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
65. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
66. | Dr. Laurent Borgmann & Karsten Kneese | 'absolutely intercultural!' 15 Practical training and studies abroad Culture as the software of the mind | absolutely intercultural | |
67. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
68. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
69. | Kathy Courtney | Smart Buyer S&D | | |
70. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
71. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
72. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
73. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
74. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
75. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
76. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
77. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
78. | Creutzfeld & Jakob | Software | Gottes Werk und Creutzfelds Be | |
79. | Dr. Timothy Chou | The End of Software | | |
80. | Jay Elliott | Migo Software | Castellini on Computers | |
81. | Jay Elliott | Migo Software | Castellini on Computers | |
82. | ILLEKTROLAB | Internal Software | System Check EP | |
83. | Jay Elliott | Migo Software | Castellini on Computers | |
84. | dr.squ | Software Song 2 | Synthdemos @ deepsonic.ch | |
85. | Rev. Jeff Miner | Software Upgrade | | |
86. | Antonio Quirarte y Juan Ramón Ruelas | 28) Software Guru | Eon 4.5 | |
87. | Antonio Quirarte y Juan Ramón Ruelas | 28) Software Guru | Eon 4.5 | |
88. | MFG Baden-Württemberg | 04 / Social Software | MFG Innovationcast | |
89. | Jay Elliott | Migo Software | Castellini on Computers | |
90. | Directions Media | Safe Software at 13 | | |