Skip to main content

Protecting Security Systems

This excerpt from a 2015 article on a Russian technology website explains a methodology for effective inventory of information assets. (CSC: Inventory of Authorized and Unauthorized Devices)

Language
Russian
ILR Level
2+/3
ACTFL Proficiency
Superior
Material Type
Language Learning Object
Modality
Reading
Topic
Science/Technology
Learning Objectives
Maintenance & Improvement
Publication Year
2016
LLO Logo