ID | Interpret | Skladba | Album | |
31. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
32. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
33. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
34. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
35. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
36. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
37. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
38. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
39. | Eric Rescorla, RTFM, Inc. | Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | |
40. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | CERT's Podcasts for Business Leaders | |
41. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
42. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
43. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
44. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
45. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
46. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
47. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
48. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
49. | Galen Smith | Naturalism, a Science-based Alternative to Faith-based Religions | Humanist Union of Madison | |
50. | Chris May | Better Incident Response through Scenario-Based Training - Part 1: Train as You Fight: Use Scenario-Based Exercises | CERT's Podcasts for Business Leaders | |
51. | Kent Bottles, MD and Paul Keckley, PhD | Evidence-Based Medicine with Paul H. Keckley,PhD and Exec. Director of The Vanderbilt Center for Evidence-Based Medicine | The Journal of Medical Practice Management | |
52. | Cat Claws | Non L'Hai Mica Capito | Amazon | |
53. | Alex Chinnici ft Mia Martini | Non finisce mica (rmx) | ilbombardone.com | |
54. | Anghelos | Ectenia mica, gl. I | Bucura-te Sf. Parascheva, mult folositoare! | |
55. | Syndikat D.1.S. | Syndikat D.1.S. D.1.S. u mica | www.neubau-city.de | |
56. | Tony Done's Hollywood Quintet | tonydoneshollywoodquintet mica | | |
57. | Fleury Medicina e Sa�de | O �nus da hipertens�o arterial sist�mica aos olhos | Fleury PodCast | |
58. | Steve Gibson with Leo Laporte | Security Now 91: Marc Maiffret of eEye Digital Security - sponsored by Astaro Corp. | Security Now May 2007 | |
59. | Bruce Cowper | Microsoft Webcast: Security Series : System Security Configuration Though Group Policy | | |
60. | Steve Gibson with Leo Laporte | Security Now 91: Marc Maiffret of eEye Digital Security - sponsored by Astaro Corp. | Security Now May 2007 | |