Catalog
Displaying 76 - 100 of 367 (page 4 of 15)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
It Is Good to Have a Wise Mind #2: The Marriage Contract | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #3: A Family Lesson | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #4: Obtaining a Loan | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #5: Going on an Outing | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
It Is Good to Have a Wise Mind #6: A Tough Economy | Arabic, Yemeni | 2+/3 | Superior | Video | Video Learning Object | |
Malicious Programs in Mobile Apps | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Heartbleed Vulnerabilities | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Tracking Down "The Moon" | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Android Malware | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Mobile Payment Security | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Making BYOD Work | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Arbor Networks and Security Challenges | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Repairing Data Breaches | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Wireless Attacks | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
DEDECMS Vulnerabilities | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Router Security Issues | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Mobile Phone Data Traffic | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Software Management | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object |
Pagination