ID | Interpret | Skladba | Album | |
121. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
122. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
123. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
124. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
125. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
126. | Steve Gibson with Leo Laporte | Security Now 66: Vista Security - Sponsored by Astaro Corp. | Security Now November 2006 | |
127. | Steve Gibson with Leo Laporte | Security Now 52: Security Bulletins - Sponsored by Astaro Corp. | Security Now August 2006 | |
128. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
129. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
130. | Steve Gibson with Leo Laporte | Security Now 65: Why Is Security So Difficult? - Sponsored by Astaro Corp. | Security Now November 2006 | |
131. | Steve Gibson with Leo Laporte | Security Now 58: Security Alert! - sponsored by Astaro Corp. | Security Now September 2006 | |
132. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
133. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
134. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
135. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
136. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
137. | Steve Gibson with Leo Laporte | Security Now 179: Cracking Security Certificates | Security Now January 2009 | |
138. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
139. | David Tesar | Enterprise Mobile Security Interview | Enterprise Mobile Security Interview | |
140. | CNET News.com | Security Bites 71: An interview with Rsnake | Security Bites | |
141. | CNET News.com | Security Bites 71: An interview with Rsnake | Security Bites | |
142. | Interwoven's GearUp Podcast | Interview: Ira Winkler, Security Expert | podcast@interwoven.com | |
143. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
144. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
145. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
146. | Susan Radke, Founder and President, Berkeley Geo-Research Group and Eddie Hanebuth, Founder and President, Digital Quest Inc. | Interview with Authors of GIS Tutorial for Homeland Security | ESRI Speaker Series | |
147. | MFG Baden-Württemberg | 16 / Mit IT Security gegen Datenspione – Interview mit Harald Woll | MFG Innovationcast | |
148. | Dan York & Jonathan Zar | Blue Box Podcast #6: VoIP security news, Interview with Mark Spencer of Asterisk/Digium | Blue Box: The VoIP Security Podcast | |
149. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
150. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |