Catalog
Displaying 276 - 300 of 666 (page 12 of 27)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Performing a Security Audit in Event Viewer | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Data Encryption | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Power Companies Coming Under Cyber Attack | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
VMware Solutions | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Evaluating Cyber Exercises | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Sony's Security Mishap | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Chinese Fishing Boat Incident | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Death of Osama bin Laden | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Yonaguni Island | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
NACs for the BYOD Era | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The State of the National Cyber Command | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Reviewing Traditional Security Methods | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Increased Use of WIPS in Financial and Educational Institutions | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Castle Defense Systems and Cybersecurity | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Bringing Security to the Wild West of IT | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Installation Requirements | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Spear Phishing | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Tips for Managing Business Data | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The Other Half of Security | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Integrated Log Analysis | Korean | 2+/3 | Superior | Reading | Language Learning Object |
Pagination