ID | Interpret | Skladba | Album | |
151. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 3: Resiliency Engineering: A Preview | CERT's Podcasts for Business Leaders | |
152. | BeyeNETWORK | Inmon's Hierarchy of Needs for Information Technology, Part 2 | Audio Article | |
153. | BeyeNETWORK | Inmon's Hierarchy of Needs for Information Technology, Part 1 | Audio Article | |
154. | Harold Boeck | RFIDRadio-008 - What Are the Differences Between Item Level Tagging, Case Level Tagging and Pallet Level Tagging? | RFID Radio | |
155. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
156. | Bill Wilson | Using Standards to Build an Information Security Program - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
157. | David and Sandra Carron | Episode 11 - National Organizations - Part 1 | Ravencast | |
158. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 2 | University Report | |
159. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 2 | University Report | |
160. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 1 | University Report | |
161. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 1 | University Report | |
162. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
163. | Business Intelligence Network | The Enterprise Data Mountain, Part 2 - Storing and Managing Master Data | Audio Article | |
164. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
165. | dziant | For example, download contact information, containing phone number and/or address from all airline companies in the city of your choice and make sure, you always have the information when you need it. | www.dziant.com | |
166. | Jesse Jackson | 1984 Democratic National Convention Address Part 1 | | |
167. | Atomine Elektrine | 07 Reliance | -1994- Atomine Elektrine - Elemental Serverance(cold Meat Industry) | |
168. | BILLY WRAY | Reliance | Piano Meditations | |
169. | Atomine Elektrine | Reliance | Binomial Fusion | |
170. | Atomine Elektrine | 07 Reliance | -1994- Atomine Elektrine - Elemental Serverance | |
171. | Atomine Elektrine | 07 Reliance | -1994- Atomine Elektrine - Elemental Serverance(cold Meat Industry) | |
172. | Flaw | Reliance | American Arrogance | |
173. | Flaw | Reliance | Live at Elixur | |
174. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
175. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
176. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
177. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started | CERT's Podcasts for Business Leaders | |
178. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 2: Selling Security and Pinpointing Acceptable Risk | CERT's Podcasts for Business Leaders | |
179. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
180. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |