ID | Interpret | Skladba | Album | |
31. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
32. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
33. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
34. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | CERT’s Podcasts for Business Leaders | |
35. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
36. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
37. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
38. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
39. | Betsy Nichols | Building a Security Metrics Program - Part 3: Challenges and Getting Started | CERT’s Podcasts for Business Leaders | |
40. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
41. | Barbara Laswell | Building Staff Competence in Security - Part 2: What Skills Should a Hiring Manager Look For? | CERT Podcasts for Business Leaders | |
42. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
43. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
44. | Barbara Laswell | Building Staff Competence in Security - Part 1: Identify and Match Required Competencies to Roles | CERT Podcasts for Business Leaders | |
45. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
46. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
47. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
48. | Creutzfeld & Jakob | Software | Gottes Werk und Creutzfelds Be | |
49. | Dr. Timothy Chou | The End of Software | | |
50. | The Parody Bits | Software Free | Live @ Visit Days 2009 | |
51. | Jay Elliott | Migo Software | Castellini on Computers | |
52. | Jay Elliott | Migo Software | Castellini on Computers | |
53. | ILLEKTROLAB | Internal Software | System Check EP | |
54. | Business Intelligence Network | Why Buy Proprietary Software? | Audio Article | |
55. | Directions Media | Safe Software at 13 | | |
56. | Inside Digital Media with Phil Leigh | Software-as-a-Service | Inside Digital Media with Phil Leigh | |
57. | Daddyo | Little Shop of Software | | |
58. | TextAloud: NeoSpeech Paul 16k | launching software.mp3 | Created: 7/22/2005 3:14:53 PM | |
59. | dr.squ | Software Song 2 | Synthdemos @ deepsonic.ch | |
60. | Rev. Jeff Miner | Software Upgrade | | |