Catalog
Displaying 26 - 50 of 237 (page 2 of 10)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Insurgency in Syria: Past and Present | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Turkish Foreign Affairs | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Turkey and the Assad Regime | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Turkey, the Kurds, and Syria | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Cypriot Economy | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Future of the EU | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Turkish Political Dilemmas | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The ForeScout CounterACT Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Using SCCM to Detect Unauthorized Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Securing the Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advanced Vulnerability Assessment with Metasploit | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Comprehensive Protection from Malware | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Web Application Authentication Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Essential Tool for Wi-Fi Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
VMware vSphere Data Protection | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Importance of Information Security Awareness | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Smart Firewall Management | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Policies for Allocating Privileges | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination