ID | Interpret | Skladba | Album | |
91. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
92. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
93. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
94. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
95. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
96. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
97. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
98. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
99. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
100. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
101. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 4: Software Process and Raising Awareness | CERT’s Podcasts for Business Leaders | |
102. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 1: Buying vs. Building Software | CERT's Podcasts for Business Leaders | |
103. | Ask Leo! | What's with Microsoft's Patents? | Ask Leo! | |
104. | Timothy B. Lee | Patents in the Abstract | Cato Daily Podcast | |
105. | Internet Caucus Advisory Committee | Patents: A Look Ahead to the Future | Congress Hears Tech Policy Debates | |
106. | Internet Caucus Advisory Committee | Patents: A Look Ahead to the Future | Congress Hears Tech Policy Debates | |
107. | Timothy B. Lee | When Patents Block Progress | Timothy B. Lee | |
108. | Timothy B. Lee | When Patents Block Progress | Timothy B. Lee | |
109. | Timothy B. Lee | When Patents Block Progress | Timothy B. Lee | |
110. | ZDNet | Sun's Jonathan Schwartz on Grids, Patents, Etc. | IT Matters Volume 1 | |
111. | EPP-ED | Patents on Computer-implemented inventions | Software patent hearings | |
112. | Inside Digital Media with Phil Leigh | Bell Labs Claim To MP3 Patents | Inside Digital Media with Phil Leigh | |
113. | CNET.com | Buzz Out Loud 589: The mother of all patents | Buzz Out Loud | |
114. | Inside Digital Media with Phil Leigh | Bell Labs Claim To MP3 Patents | Inside Digital Media with Phil Leigh | |
115. | Jeff Gamet & Bryan Chaffin | AWR #142 - iPod Shuffle, Apple Netbooks, Patents, & More | The Mac Observer's Apple Weekly Report | |
116. | John Cunniff and Dan Hanson | Intellectual Property - Patents, Trademarks & Copyright | The Great Lakes Geek Show | |
117. | John Cunniff and Dan Hanson | Intellectual Property - Patents, Trademarks & Copyright | The Great Lakes Geek Show | |
118. | Bruce Cowper | Microsoft Webcast: Security Series : System Security Configuration Though Group Policy | | |
119. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
120. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - eDMZ Security | | |