ID | Interpret | Skladba | Album | |
1
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Joe.Saddi@booz.com | Business in the Middle East | | |
2
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Mark Silver, Heart of Business, Inc. | Whether or not to publish your prices | | |
3
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 1: What Is Convergence and Why Is It Important? | | |
4
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 3: Trends and Future Directions | | |
5
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | | |
6
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | | |
7
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | | |
8
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Brian Gallagher | Becoming a Smart Buyer of Software | | |
9
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Greg Newby | The Human Side of Security Trade-Offs - Part 1: Raising Awareness and Motivation | | |
10
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Greg Newby | The Human Side of Security Trade-Offs | | |
11
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance | | |
12
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | | |
13
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | | |
14
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes | | |
15
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 1: The Increasing Scope and Importance of Business Continuity Planning | | |
16
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 2: Selling Security and Pinpointing Acceptable Risk | | |
17
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 2: Getting Started | | |
18
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security | | |
19
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | | |
20
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 2: National Risk Management Frameworks and Public/Private Partnerships | | |
21
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 1: Critical Infrastructures and Their Reliance on Critical Information Infrastructures | | |
22
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | | |
23
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | | |
24
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | | |
25
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | | |
26
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 3: First Steps and Additional Resources | | |
27
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bob Charette | Is There Value in Identifying Software Security Never Events? | | |
28
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | | |
29
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | | |
30
Warning: preg_replace(): Unknown modifier 'K' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 1: Roles, Responsibilities, and Reporting | | |