ID | Interpret | Skladba | Album | |
151. | CMC Media | CM Today Includes Synchronizing BOM Configurations Across Product Lifecycle Helps Manufacturers Hit Metrics Driving | | |
152. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 1: What Is Benchmarking and Why Is It Useful? | CERT’s Podcasts for Business Leaders | |
153. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
154. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
155. | Steve Gibson with Leo Laporte | Security Now 179: Cracking Security Certificates | Security Now January 2009 | |
156. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations | CERT’s Podcasts for Business Leaders | |
157. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
158. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
159. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
160. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles | CERT's Podcasts for Business Leaders | |
161. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | CERT's Podcasts for Business Leaders | |
162. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
163. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
164. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | CERT’s Podcasts for Business Leaders | |
165. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
166. | Randy Rogers Band | You Start Over Your Way, I'll Start Over Mine | Steamboat 2006 | |
167. | Randy Rogers Band | You Start Over Your Way, I'll Start Over Mine | Steamboat 2008 | |
168. | Gary McGraw | How to Start a Secure Software Development Program - Part 1: The Evolution of Secure Software Development | CERT’s Podcasts for Business Leaders | |
169. | The Los Dos Bros | Start All Over Again | Songs For Feeling Strong | |
170. | Beautiful Balloon | Rip it Up & Start Again | | |
171. | Donovan Woods | Car Won't Start | The Hold Up | |
172. | Common Rotation | Don't Let's Start 8-3-03 | Coalition of the Willing | |
173. | Abandoned Pools | Start Over | Humanistic | |
174. | Common Rotation | Don't Let's Start | The Big Fear | |
175. | The Alameda All Stars | Start It Up | March 2004 Demo | |
176. | Franz Ferdinand | 2. don't start | Demos | |
177. | Common Rotation | Don't Let's Start | The Big Fear | |
178. | Dr. Jeff Arthurs | Start Where They Are | Preaching Points | |
179. | Absent Minded | Start Over | Tip 30 @ www.mp3-start.nl | |
180. | Darius | 02-New Start | Darius II | |