Catalog
Displaying 1 - 25 of 32 (page 1 of 2)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Malicious Programs in Mobile Apps | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Heartbleed Vulnerabilities | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Tracking Down "The Moon" | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Android Malware | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Arbor Networks and Security Challenges | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Repairing Data Breaches | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Wireless Attacks | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
DEDECMS Vulnerabilities | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Router Security Issues | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Mobile Phone Data Traffic | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Small Business Data Security | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Combatting Advanced Persistent Threats | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Repelling Malware | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
New Forms of Malware Propagation | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Dynamic Malware Analysis | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
The Evolution of Data Storage | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Opportunities and Challenges of BYOD | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
The Value of CSIRTs | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Advice About Network Protection | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Understanding Vulnerabilities | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
How to Conduct Penetration Tests | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Tools for Asset Management | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Effective Asset Management | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Software System Security | Spanish | 2+/3 | Superior | Reading | Language Learning Object | |
Conscientious Server Configuration | Spanish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination