ID | Interpret | Skladba | Album | |
61. | Professor David Laibson | The Psychology of Saving and Investment: Sticky Biases and the Curse of Education | LSE Public Lectures and Events | |
62. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
63. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
64. | Christian Wenz | ZendCon Sessions: (In)secure Ajax-y Websites with PHP | | |
65. | Bryan MS | Establishing a Secure and Manageable Messaging Infrastructure | | |
66. | Gary McGraw | How to Start a Secure Software Development Program | CERT’s Podcasts for Business Leaders | |
67. | B2B International | B2B Podcast on Guiding Acquisitions and Investment Policy, Narrated By Julia Cupman | A Whitepaper From www.b2binternational.com | |
68. | Julian Phillips - Gold Forecaster | Julian Phillips - Gold Forecaster - SilverSeek.com 2006 Silver Investment Conference | SilverSeek.com 2006 Silver Investment Conference | |
69. | Bryan MS | TechNet Webcast: Secure Messaging with Microsoft Antigen (Level | | |
70. | Information Security Media Group | Information Security Media Group Interview with Secure Computing | InfoSecurity NY 2007 | |
71. | Business Intelligence Network | The Looming Leadership Talent Wars and What Organizations Need to Do to Secure Their Future | Audio Article | |
72. | Tony Chor | Case Study: The Secure Development Lifecycle and Internet Explorer 7 | Black Hat USA 2006 | |
73. | Aaron; Sandy Sharma | Planning and Deploying a Secure Messaging Solution with Exchange Server 2007 | | |
74. | Ragib Hasan | The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance | FAST '09 | |
75. | Freedom Scientific | September 2009 - More JAWS 11; Research It; Secure Braille Driver Initiative; Jim Ellsworth | FSCast | |
76. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
77. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
78. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
79. | Christina Hollingsworth | Straight Talk About Key Technologies Today's IT Talent Needs To Master:Christina Hollingsworth, Corporate IT Director Genworth Financial Investment Services Inc. | EnterpriseLeadership.org Podcasts for the CIO | |
80. | Brooks Jensen, Editor, LensWork Publishing | LW0501 - Bits Make Bites Make Meals | LensWork Podcasts on Photography and the Creative Process | |
81. | Brooks Jensen, Editor, LensWork Publishing | LW0501 - Bits Make Bites Make Meals | LensWork Podcasts on Photography and the Creative Process | |
82. | Presenter: Victor Bahna, Sr. Director Windows Infrastructure and Edge Services; Microsoft IT, Microsoft Corporation, and Samm DiStasio, Director, Infrastructure Optimization Strategy, Microsoft Corpor | Microsoft Webcast: How Microsoft Maximizes Its IT Investment Through Infrastructure Optimization | | |
83. | The Semantic Web Gang, Brad Burnham, Chris Morrison and Erick Schonfeld | The Semantic Web Gang discusses investment opportunities in semantic technology | The Semantic Web Gang | |
84. | Love is All | Make Out Fall Out Make Up The Bees Remix | | |
85. | Tony Bishop | Lessons Learned From A Three-year SOA Deployment In The Banking Industry: Tony Bishop, Former IT Executive With Wachovia’s Corporate Investment Banking Division | EnterpriseLeadersip.ord Podcasts for the CIO | |
86. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
87. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
88. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
89. | France Galle | Dont Make War Captain, Make Love | | |
90. | dziant | Add customized information to your iPod. Visit www.dziant.com, make your selection and get your own personalized RSS-Feed to make your iPod a lot smarter. Add hotel, airline or rental car directories | www.dziant.com | |