Vše Interpret Skladba Album
mp3seznam.cz - Žádný ze zde umístěných souborů se nenachází na tomto serveru. Proto nezodpovídáme za jejich kvalitu ani za porušování autorských práv - tuto zodpovědnost nese server na který odkazujeme.
IDInterpretSkladbaAlbum
 91. Lisa Young Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application  CERT's Podcasts for Business Leaders  
 92. Lisa Young Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started  CERT's Podcasts for Business Leaders  
 93. Clint Kreitner Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations  CERT’s Podcasts for Business Leaders  
 94. Lisa Young Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations  CERT’s Podcasts for Business Leaders  
 95. Lisa Young Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity  CERT’s Podcasts for Business Leaders  
 96. Lisa Young Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model  CERT’s Podcasts for Business Leaders  
 97. Styles P Lumidee End Of Time  Big Mike and DJ Thoro-Follow The Leaders 5  
 98. Paul Lancour - PodTech.net On Demand 2.0 – Collaboration at the Tipping Point  WebEx – Conversations with IT & Business Leaders  
 99. Clint Kreitner Getting to a Useful Set of Security Metrics - Part 3: Where to Start  CERT's Podcasts for Business Leaders  
 100. Gary Daniels Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players  CERT’s Podcasts for Business Leaders  
 101. Gary Hinson Getting in Front of Social Engineering - Part 3: Detective, Corrective, and Preventive Actions  CERT's Podcasts for Business Leaders  
 102. Larry Rogers A New Look at the Business of IT Education - Part 1: Filling a Gap  CERT's Podcasts for Business Leaders  
 103. Gary McGraw How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid  CERT's Podcasts for Business Leaders  
 104. Gene Kim The Security 'X' Factor - Part 2: Taking Action  CERT Podcasts for Business Leaders  
 105. Gene Kim The Security 'X' Factor - Part 3: Overcoming Hurdles  CERT Podcasts for Business Leaders  
 106. Gene Kim The Security 'X' Factor - Part 1: The Study  CERT Podcasts for Business Leaders  
 107. Gene Kim Connecting the Dots between IT Operations and Security - Part 2: Benchmarking and Situational Awareness  CERT's Podcasts for Business Leaders  
 108. Gene Kim Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics  CERT's Podcasts for Business Leaders  
 109. Gene Kim Connecting the Dots between IT Operations and Security  CERT's Podcasts for Business Leaders  
 110. Larry Rogers A New Look at the Business of IT Education - Part 3: Evolving and Gaining Buy-In  CERT's Podcasts for Business Leaders  
 111. Larry Rogers A New Look at the Business of IT Education - Part 2: Curriculum Fundamentals and Goals  CERT's Podcasts for Business Leaders  
 112. Larry Rogers A New Look at the Business of IT Education  CERT's Podcasts for Business Leaders  
 113. Gary Hinson Getting in Front of Social Engineering - Part 2: Identifying Social Engineering Attempts and Attacks  CERT's Podcasts for Business Leaders  
 114. Gary Hinson Getting in Front of Social Engineering  CERT's Podcasts for Business Leaders  
 115. Gary Hinson Getting in Front of Social Engineering - Part 1: Why We're Susceptible  CERT's Podcasts for Business Leaders  
 116. Gary McGraw How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software  CERT's Podcasts for Business Leaders  
 117. Gary McGraw How to Start a Secure Software Development Program  CERT’s Podcasts for Business Leaders  
 118. Gary McGraw How to Start a Secure Software Development Program - Part 1: The Evolution of Secure Software Development  CERT’s Podcasts for Business Leaders  
 119. Gary McGraw How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software  CERT's Podcasts for Business Leaders  
 120. Stephanie Losi & Julia Allen The ROI of Security - Part 2: ROI Methods  CERT Podcasts for Business Leaders  
  «    1 2 3 4 5 6 7    »
Gamesníci.cz - Superhry
Přehled nejstahovanějších MP3 za uplynulý den
16.  Wohnout - Pedro se vracístaženo: 1x
17.  Yello - Jingle Bellsstaženo: 1x
18.  Depeche Mode - I Want It Allstaženo: 1x
19.  Alkehol - Hlupák váhástaženo: 1x
20.  Jaromír Nohavica - Chtěl bych zažítstaženo: 1x
21.  Horkýže Slíže - Mao C Tungstaženo: 1x
22.  Daniel Landa - Malá díra v hlavěstaženo: 1x
23.  Rytmus - Zlatokopkystaženo: 1x
24.  Kristina - Horehroniestaženo: 1x
25.  DeTee - Fanfárystaženo: 1x
26.  Tleskač - Zelená Je Trávastaženo: 1x
27.  Queen - We Are the Championsstaženo: 1x
28.  Jaromír Nohavica - Směsstaženo: 1x
29.  Milo - Pro Eliškustaženo: 1x
30.  Depeche Mode - Pipelinestaženo: 1x