ID | Interpret | Skladba | Album | |
61. | Elbow | Forget Myself | Leaders of the Free World | |
62. | Elbow | My Very Best | Leaders of the Free World | |
63. | Elbow | Leaders Of The Free World | Leaders Of The Free World | |
64. | Elbow | Picky Bugger | Leaders Of The Free World | |
65. | Elbow | Forget Myself | Leaders of the Free World | |
66. | Elbow | Forget Myself | Leaders Of The Free World | |
67. | Dr Peter Saunders | Xn Leadership & Vocation | ELF2003 Leaders In Society Nwk | |
68. | Elbow | Leaders Of The Free World | Leaders Of The Free World | |
69. | Gary Hinson | Getting in Front of Social Engineering - Part 2: Identifying Social Engineering Attempts and Attacks | CERT's Podcasts for Business Leaders | |
70. | Gary Hinson | Getting in Front of Social Engineering - Part 3: Detective, Corrective, and Preventive Actions | CERT's Podcasts for Business Leaders | |
71. | Gary Hinson | Getting in Front of Social Engineering | CERT's Podcasts for Business Leaders | |
72. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
73. | Gary Hinson | Getting in Front of Social Engineering - Part 1: Why We're Susceptible | CERT's Podcasts for Business Leaders | |
74. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
75. | Julia Allen | Getting Real about Security Governance - Part 2: A Guide to Effective Governance | CERT’s Podcasts for Business Leaders | |
76. | Julia Allen | Getting Real about Security Governance - Part 1: An Evolution Toward Practicality | CERT’s Podcasts for Business Leaders | |
77. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
78. | Julia Allen | Building More Secure Software | CERT's Podcasts for Business Leaders | |
79. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 3: Resiliency Engineering: A Preview | CERT's Podcasts for Business Leaders | |
80. | Julia Allen | Getting Real about Security Governance | CERT’s Podcasts for Business Leaders | |
81. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
82. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
83. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
84. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
85. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
86. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted | CERT’s Podcasts for Business Leaders | |
87. | Cassidy Jag | Guccilouifendi | Big Mike and DJ Thoro-Follow The Leaders 5 | |
88. | Alessandro Acquisti | Privacy: The Slow Tipping Point | CERT Podcasts for Business Leaders | |
89. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 3: Lessons Learned and the Future | CERT Podcasts for Business Leaders | |
90. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 2: The Evolution of User Attitudes | CERT Podcasts for Business Leaders | |