ID | Interpret | Skladba | Album | |
121. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
122. | Gary McGraw | How to Start a Secure Software Development Program | CERT’s Podcasts for Business Leaders | |
123. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
124. | METAL Injection Guerilla Radio: The Entropy League | Neaera / Slayer / Misery Index / The Absence / God Dethroned / Cryptopsy / Dragonlord | Episode 54: Absent | |
125. | Dj.Gonzales | Retro Classics MINDEN SZOMBATON AZ INDEX CAFEBAN V�RUNK NY�REGYH�Z�N! | | |
126. | Hayato Matsuo | Ogre Battle 64: Person of Lordly Caliber - Accretion Disk | | |
127. | Hayato Matsuo | Ogre Battle 64: Person of Lordly Caliber - Accretion Disk | | |
128. | Sung Hoon Baek and Kyu Ho Park, Korea Advanced Institute of Science and Technology | Prefetching with Adaptive Cache Culling for Striped Disk Arrays | 2008 USENIX Annual Technical Conference | |
129. | Tony Chor | Case Study: The Secure Development Lifecycle and Internet Explorer 7 | Black Hat USA 2006 | |
130. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
131. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
132. | Bryan MS | TechNet Webcast: Secure Messaging with Microsoft Antigen (Level | | |
133. | Alex Wunschel | Blick 178 ARD-ZDF-Onlinestudie, Playboy-Verlosung, Twitter Brand Index und Facebook-Gangster | Tellerrand | |
134. | Various Speakers | Conflict Prevention and Resolution Forum: The Global Peace Index: Its Value and Implications, and the Next Steps | Johns Hopkins SAIS Events - Summer 2007 | |
135. | Aaron; Sandy Sharma | Planning and Deploying a Secure Messaging Solution with Exchange Server 2007 | | |
136. | Ragib Hasan | The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance | FAST '09 | |
137. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: Another USB security concern looms, Fujitsu's petabyte disk arrays | | |
138. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
139. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
140. | Freedom Scientific | September 2009 - More JAWS 11; Research It; Secure Braille Driver Initiative; Jim Ellsworth | FSCast | |
141. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
142. | Tracey Webcast Team | IT Manager Webcast Audio: Visualize Data with System Center Operations Manager, System Center Configuration Manager Add-Ins for Visio 2007 | | |
143. | Clutter with Ann Wilson | Smoking (DFF Sound System : fire in the sound system mix) | Remix Fight! #55 | |
144. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
145. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
146. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
147. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: DNA-based data storage; Carnegie-Mellon study casts doubt on vendor disk claims | | |
148. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
149. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
150. | Strong Bad vs Rammstein | The System is Du | | |