ID | Interpret | Skladba | Album | |
181. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 036 - Team Building: Part II - Tips for Team Members | | |
182. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 036 - Team Building: Part II - Tips for Team Members | | |
183. | WCC Genesys North America | Effective Strategies for Implementing HR BPO | | |
184. | Ian & Nina Fry | Implementing CDG Curriculum in Your Church | 2007 Children Desiring God Conference | |
185. | WINA's Charlottesville--Right Now with Coy Barefoot | UVa's Cheryl Gomez on reducing energy and water usage on Grounds | Charlottesville Podcasting Network | |
186. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 1: Nuts and Bolts versus the Big Picture | CERT’s Podcasts for Business Leaders | |
187. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
188. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
189. | Web Standards Group London | Jeremy Keith: Implementing Microformats | Web Standards Group London | |
190. | PGP Corporation | Colleen Ebel on Implementing Encryption | PGP® Security Podcasts | |
191. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
192. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
193. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
194. | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou, University of Illinois at Urbana-ChampaignTPE2 | Designing and Implementing Malicious Hardware | | |
195. | Clifford Wolff | Implementing Buffer Overflow Attacks | | |
196. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
197. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
198. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
199. | Steve Gibson with Leo Laporte | Security Now 91: Marc Maiffret of eEye Digital Security - sponsored by Astaro Corp. | Security Now May 2007 | |
200. | Bruce Cowper | Microsoft Webcast: Security Series : System Security Configuration Though Group Policy | | |