ID | Interpret | Skladba | Album | |
61. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
62. | Boyer & Associates - Jack Boyer | Best Practices in Accounting Software | www.boyerassoc.com | |
63. | Jack Boyer with Guest Steven Bragg | Best Practices in Accounting Software Podcast | www.boyerassoc.com | |
64. | Jack Boyer with Guest Steven Bragg | Best Practices in Accounting Software Podcast | www.boyerassoc.com | |
65. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
66. | Creative Chaos | Real Time Software Development | Creative Chaos PodCast | |
67. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
68. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
69. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
70. | V. Alex Brennen | Pseudonymous Software Development and Strong Distribution | HOPE Number Six, 21-23 July 2006 | |
71. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
72. | Keith Elder and Chris Woodruff | Episode 16: Discussions about Gnome, Linux and Software Development with Luis Villa | Deep Fried Bytes | |
73. | CMC Media | CM Today Includes Electric Cloud and ReleaseTEAM Partner to Deliver Software Development Optimization | | |
74. | EDUCAUSE | E07 - Social Software in Higher Education: Isolated Accidents or the Start of Something Big? | EDUCAUSE 2007 | |
75. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
76. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
77. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
78. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
79. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
80. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
81. | Robert Seacord | Mainstreaming Secure Coding Practices | CERT's Podcasts for Business Leaders | |
82. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
83. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
84. | Tony Chor | Case Study: The Secure Development Lifecycle and Internet Explorer 7 | Black Hat USA 2006 | |
85. | Creutzfeld & Jakob | Software | Gottes Werk und Creutzfelds Be | |
86. | Dr. Timothy Chou | The End of Software | | |
87. | Directions Media | Safe Software at 13 | | |
88. | Inside Digital Media with Phil Leigh | Software-as-a-Service | Inside Digital Media with Phil Leigh | |
89. | ILLEKTROLAB | Internal Software | System Check EP | |
90. | RAIDERS OF THE LOST ARP | Software Creations | Tema5 | |