ID | Interpret | Skladba | Album | |
61. | Michalis Polychronakis, FORTH-ICS; Panayiotis Mavrommatis and Niels Provos, Google Inc. | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | First USENIX Workshop on Large-Scale Exploits and Emergent Threats | |
62. | intelligentdesign | The Design of Life: What the Evidence of Biological Systems Reveals | Intelligent Design The Future | |
63. | Dina Henry Scott & Lee Scott | Episode 005 - Team Development ... Part 1 | Controlling Chaos | |
64. | Bryan and Chris, Jupiter Broadcasting | IN DEPTH: Cross Development Part 1 | IN DEPTH LOOK | |
65. | Martin Lindner, Stephanie Losi & Julia Allen | Proactive Remedies for Rising Threats - Part 1: The Evolving Threat | CERT Podcasts for Business Leaders | |
66. | DJ Homo Ludens | Intelligent Design Part 1 | Intelligent Design | |
67. | Typeradio special | 1 minute of design part 3 | Typeadio Podcast | |
68. | Typeradio special | 1 minute of design part 1 | Typeadio Podcast | |
69. | Hazardous Waste Clean-Up Information | AUGU 13, 2007: Life Cycle Thinking and Solid Waste: A State's Perspective | | |
70. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
71. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
72. | Pat Flanders with Rick Weaver & Rawn Shah | SOA foundation, Part 1: Business-driven development | IBM WebSphere technical podcast series on developerWorks | |
73. | Alex Jones | Iran Threat vs China Threat | | |
74. | Alex Jones | Iran Threat vs China Threat | | |
75. | intelligentdesign | Predictions from an Intelligent Design Perspective: Conversation with Biologist Luman Wing, Part 3 | Intelligent Design The Future | |
76. | intelligentdesign | Systems Biology and Intelligent Design: Conversation with Biologist Luman Wing, Part 2 | Intelligent Design The Future | |
77. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
78. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
79. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 1: Understanding the Threat | CERT’s Podcasts for Business Leaders | |
80. | Artist Insider | Artist Insider - Artist Insider 5.2 – Rick Cua – Little Colored Dots | Rick Cua | |
81. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
82. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
83. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
84. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
85. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
86. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
87. | Artist Insider | Artist Insider - Artist Insider 5.3 – Rick Cua – Where the Money is | Rick Cua | |
88. | Artist Insider | Artist Insider - Artist Insider 5.4 – Rick Cua – Balance | Rick Cua | |
89. | Artist Insider | Artist Insider - Artist Insider 5.5 – Rick Cua – Hanging Out | Rick Cua | |
90. | Scott Puckett | The Calendar - Implementation - 1 Corinthians 16:13-14 | Christ Kingdom Church | |