ID | Interpret | Skladba | Album | |
31. | Paul Goldstein | Errors and Omissions | | |
32. | Swingin' Love Corpses | Grafitti Errors | Infamous Bay Jams | |
33. | Paul Goldstein | Errors and Omissions | | |
34. | Ben Simo and Pradeep Soundararajan | Erroneous Errors | | |
35. | Grand Masta Poppa Cap | Bad Dudes - Trials N Errors | OverLooked ReMiX | |
36. | Cliffe Knechtle | Isn't the New Testament full of errors?! | Isn't the New Testament Full of errors?! | |
37. | Cliffe Knechtle | Isn't the New Testament full of errors?! | Isn't the New Testament Full of errors?! | |
38. | Chuck Joiner | User Group Report #525 Swift Publisher from BeLight Software, Peachpit Authors Cynthia Baron and Dan Peck, Hacking Tiger with Scott Knaster, Voting for Podcasts and August MUG Events | The User Group Report with Chuck Joiner | |
39. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
40. | Bob Sutor | Part 2: Software | Open Standards vs. Open Source | |
41. | Society of Critical Care Medicine | SCCM Pod-53 Reducing Medication Errors in the ICU | iCritical Care Podcast | |
42. | Chris Macky | Avoiding Costly Errors in Investing | The Gospel of Matthew | |
43. | Earl Purdy | 02-27-08 Truth Corrects Errors in My Mind | | |
44. | Double Muslims | Errors Of Menace / Stupor Creek | 7 Inch | |
45. | Mogwai (errors remix) | auto rock (errors remix) | | |
46. | Mogwai (errors remix) | auto rock (errors remix) | | |
47. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 3: Competitive Advantage, Duty of Care, and Who's Responsible? | CERT Podcasts for Business Leaders | |
48. | Morey, Dr. Robert | Lectures on Islam #05 - Koranic Errors & Contradictions | firefighters.org | |
49. | Adam Graham | Save Money On Other People's Spelling Errors | | |
50. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 2: Why Is Security a Governance Issue? | CERT Podcasts for Business Leaders | |
51. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
52. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
53. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
54. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 1 | dougmcclure.net | |
55. | Doug McClure | BTM Podcast Architecture and Deployment Planning for IBM Tivoli ITCAM for Transactions v7.1 with Gulf Breeze Software Part 2 | dougmcclure.net | |
56. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
57. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 1: Why Should Leaders Care About Security? | CERT Podcasts for Business Leaders | |
58. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |
59. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
60. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |