ID | Interpret | Skladba | Album | |
121. | Bob Defendi, Howard Tayler, Dan Wells | Writing Excuses Season 2 Episode 8: The Three Act Structure with Bob Defendi | Writing Excuses | |
122. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
123. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
124. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
125. | Tom Moore and Bryan Rea | Bonds, Stocks, and Preferred Stocks: The Capital Structure | Your Wealth Radio Podcasts | |