Vše Interpret Skladba Album
mp3seznam.cz - Žádný ze zde umístěných souborů se nenachází na tomto serveru. Proto nezodpovídáme za jejich kvalitu ani za porušování autorských práv - tuto zodpovědnost nese server na který odkazujeme.
IDInterpretSkladbaAlbum
 91. Brian Chess  An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process  CERT's Podcasts for Business Leaders 
 92. Gene Kim  Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics  CERT's Podcasts for Business Leaders 
 93. Gary McGraw, Brian Chess, Sammy Migues  An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices  CERT's Podcasts for Business Leaders 
 94. Business Intelligence Network  BI Adoption Evolves, Part 1  Audio Article 
 95. David Chu  Pre-Professional Programs - Entrepreneurial Studies & Pre Business  College of the Holy Cross - Parent Council 
 96. Lisa Young  Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started  CERT's Podcasts for Business Leaders 
 97. Betsy Nichols  Using Benchmarking to Make Better Security Decisions - Part 2: Benchmarking Challenges and Some Works In Progress  CERT’s Podcasts for Business Leaders 
 98. David Matthews  Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request  CERT's Podcasts for Business Leaders 
 99. Betsy Nichols  Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk  CERT’s Podcasts for Business Leaders 
 100. Art Manion  Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To  CERT's Podcasts for Business Leaders 
 101. Clint Kreitner  Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy  CERT's Podcasts for Business Leaders 
 102. Brian Gallagher  Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind  CERT's Podcasts for Business Leaders 
 103. Julia Allen  Building More Secure Software - Part 2: Develop Software with a Security Mind-set  CERT's Podcasts for Business Leaders 
 104. Lisa Young  Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application  CERT's Podcasts for Business Leaders 
 105. Paul Love  Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle  CERT's Podcasts for Business Leaders 
 106. Bill Wilson  Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001  CERT’s Podcasts for Business Leaders 
 107. Paul Love  Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance  CERT's Podcasts for Business Leaders 
 108. Mary Ann Davidson  Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap  CERT's Podcasts for Business Leaders 
 109. Julia Allen  Getting Real about Security Governance - Part 2: A Guide to Effective Governance  CERT’s Podcasts for Business Leaders 
 110. Bill Crowell & Brian Contos  Convergence: Integrating Physical and IT Security - Part 1: What Is Convergence and Why Is It Important?  CERT’s Podcasts for Business Leaders 
 111. Betsy Nichols  Using Benchmarking to Make Better Security Decisions - Part 1: What Is Benchmarking and Why Is It Useful?  CERT’s Podcasts for Business Leaders 
 112. Michael Vincent  ALP courts business leaders  The World Today - October 27 
 113. Colby College 56th Leadership Institute  Tips for Business Leaders   
 114. Clint Kreitner  Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations  CERT’s Podcasts for Business Leaders 
 115. David Matthews  Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles  CERT's Podcasts for Business Leaders 
 116. Bill Wilson  The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program  CERT’s Podcasts for Business Leaders 
 117. Bill Wilson  The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method  CERT’s Podcasts for Business Leaders 
 118. Bob Charette  Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software  CERT's Podcasts for Business Leaders 
 119. Dan Swanson  Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider  CERT's Podcasts for Business Leaders 
 120. Dan Swanson  Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator  CERT's Podcasts for Business Leaders 
  «    1 2 3 4 5 6 7    »
Gamesníci.cz - Superhry
Přehled nejstahovanějších MP3 za uplynulý den
16.  Wohnout - Pedro se vracístaženo: 1x
17.  Yello - Jingle Bellsstaženo: 1x
18.  Depeche Mode - I Want It Allstaženo: 1x
19.  Alkehol - Hlupák váhástaženo: 1x
20.  Jaromír Nohavica - Chtěl bych zažítstaženo: 1x
21.  Horkýže Slíže - Mao C Tungstaženo: 1x
22.  Daniel Landa - Malá díra v hlavěstaženo: 1x
23.  Rytmus - Zlatokopkystaženo: 1x
24.  Kristina - Horehroniestaženo: 1x
25.  DeTee - Fanfárystaženo: 1x
26.  Tleskač - Zelená Je Trávastaženo: 1x
27.  Queen - We Are the Championsstaženo: 1x
28.  Jaromír Nohavica - Směsstaženo: 1x
29.  Milo - Pro Eliškustaženo: 1x
30.  Depeche Mode - Pipelinestaženo: 1x