ID | Interpret | Skladba | Album | |
181. | Science Audio | PTJ's Podcast Debate for July 2009: Developing and Using Treatment-Based Clinical Prediction Rules - Part 2 of 2 | Physical Therapy - PTJ | |
182. | Amanda Rabinowitz | Akron surgeon treats children as part of Kent-based Palestine Childrens Relief Fund | (c) 2008, WKSU | |
183. | Tracy Chapman | Stayin' Alive: Surviving the Dreams and Realities of Assessing Full-Time, Web-Based Student Learning | EDUCAUSE 2005 Annual Conference | |
184. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
185. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
186. | President George W. Bush | President Bush Attends White House Summit on Inner-City Children and Faith-Based Schools - April 24, 2008 | Presidential Speeches & Remarks | |
187. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
188. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
189. | Eric James Wolf | SWC #039 Steve Denning - The Knowledge based organization: using stories to embody and transfer knowledge. | The Art of Storytelling with Childen Podcast | |
190. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
191. | Intel Chip Chat - Powered by Connected Social Media | Intel Atom Processor-based Home Servers - Intel Chip Chat - Episode 54 | Intel Chip Chat - Powered by Connected Social Media | |
192. | Thorsten Holz, University of Mannheim; Moritz Steiner, University of Mannheim and Institut Eurécom; Frederic Dahl, University of Mannheim; Ernst Biersack, Institut Eurécom; Felix Freiling, University | Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | | |
193. | Thorsten Holz, University of Mannheim; Moritz Steiner, University of Mannheim and Institut Eurécom; Frederic Dahl, University of Mannheim; Ernst Biersack, Institut Eurécom; Felix Freiling, University | Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | | |
194. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
195. | Computerworld, Ian Lamont, Lucas Mearian | Storage This Week: Flash-based laptops reviewed; storage power savings in the data center | | |
196. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
197. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
198. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
199. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
200. | Chris May | Better Incident Response through Scenario-Based Training - Part 2: Training Geographically Distributed Teams: CERT’s XNET | CERT's Podcasts for Business Leaders | |