Catalog
Displaying 201 - 225 of 471 (page 9 of 19)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Cybersecurity Is Stronger with Teamwork | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Router Settings and LAN Security | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
New Venom | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Hacking the Hackers | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Cracking the Crackers | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Auditing Plus | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Cloud File Sharing | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Facebook for the Dead | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Preventing Problems | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Breach Problems | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Foundation Features | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
Hacker Simulations | Italian | 2+/3 | Superior | Reading | Language Learning Object | |
BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing for Network Segmentation | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
Group Policy Settings for Performing a Security Audit in Event Viewer | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination