Catalog
Displaying 1 - 25 of 70 (page 1 of 3)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Plans for Qaddafi's Burial | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Abdul Basit Returns to Libya | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Interview in Brega With Doctor and Paramedic | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
An Account of the Battle of Brega | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Certain Uses of Social Media | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Interview With an Injured Fighter | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Anniversary of February 17 | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Celebration Post-Qaddafi | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
A Prisoner of Qaddafi | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
Interview With a Rebel's Brother | Arabic, Libyan | 1+/2 | Advanced Low | Listening | Language Learning Object | |
BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending Against Targeted Attacks | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Backup Methods in the Multi-Cloud Era | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Security Competition | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination