Catalog
Displaying 151 - 175 of 283 (page 7 of 12)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Turkey-China Economic Development Plans | Turkish | 2/2+/3 | Superior | Multiple | Compact Learning Object | |
| Syrian Refugees and Kurdish Fighters | Turkish | 2/2+/3 | Superior | Multiple | Compact Learning Object | |
| Fundamentalism and the 2016 Coup Attempt | Turkish | 2/2+/3 | Superior | Multiple | Compact Learning Object | |
| Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Securing Web Applications | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Fortinet | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| The Mirsis Backup Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Recommendations for Reducing Risk | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Device and Network Security Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| How Can Server Security Be Provided? | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Active Directory Restricted Groups Policy | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Network Security Defense Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
| Cloud Computing's Role in Cybersecurity | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination
- First page
- Previous page
- …
- 5
- 6
- 7
- 8
- 9
- …
- Next page
- Last page