ID | Interpret | Skladba | Album | |
1
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | | |
2
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | The Security 'X' Factor - Part 3: Overcoming Hurdles | | |
3
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | The Security 'X' Factor - Part 1: The Study | | |
4
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 2: Benchmarking and Situational Awareness | | |
5
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | | |
6
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | Connecting the Dots between IT Operations and Security | | |
7
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | The Security 'X' Factor | | |
8
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 1: Roles, Responsibilities, and Reporting | | |
9
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 3: Methods and Tools for Tackling Risk in Complex Environments | | |
10
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Georgia Killcrece & Robin Ruefle | The Real Secrets of Incident Management | | |
11
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Georgia Killcrece & Robin Ruefle | The Real Secrets of Incident Management - Part 2: Data Flow in the Real World | | |
12
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Georgia Killcrece & Robin Ruefle | The Real Secrets of Incident Management - Part 1: Communication Is Key | | |
13
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Christopher Alberts | Assuring Mission Success in Complex Environments | | |
14
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 1: Background and Evolution from OCTAVE | | |
15
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security | | |
16
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Chris Alberts | Rethinking Risk Management - Part 1: Why Traditional Approaches Fall Short | | |
17
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 2: Getting Started | | |
18
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gene Kim | The Security 'X' Factor - Part 2: Taking Action | | |
19
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 2: Assuring Mission Success | | |
20
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | | |
21
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | | |
22
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary Hinson | Getting in Front of Social Engineering - Part 2: Identifying Social Engineering Attempts and Attacks | | |
23
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary Hinson | Getting in Front of Social Engineering - Part 3: Detective, Corrective, and Preventive Actions | | |
24
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary Hinson | Getting in Front of Social Engineering | | |
25
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary Hinson | Getting in Front of Social Engineering - Part 1: Why We're Susceptible | | |
26
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Alessandro Acquisti | Privacy: The Slow Tipping Point | | |
27
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 3: Lessons Learned and the Future | | |
28
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 2: The Evolution of User Attitudes | | |
29
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 1: The Economics of Privacy Breaches | | |
30
Warning: preg_replace(): Unknown modifier '\' in /www/mp3seznam.cz/www/telo_hledej.php on line 42
. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | | |