Catalog
Displaying 701 - 725 of 1194 (page 29 of 48)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Un Posto al Sole #19: A Job Offer | Italian | 2+/3 | Superior | Video | Video Learning Object | |
| Japanese Reading Assessment Object 01 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 02 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 03 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 04 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 05 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 06 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 07 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 08 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 09 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| Japanese Reading Assessment Object 10 | Japanese | 2/2+ | Advanced High | Reading | Assessment Object | |
| BYOD Security in Japan | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| White List Defense against Unauthorized Software | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| The Benefits of Configuration Management | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Vulnerability Testing | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Defending Against Targeted Attacks | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Building Vulnerability-Free Applications | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| The Basics of Wireless LAN Security | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Backup Methods in the Multi-Cloud Era | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Security Competition | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Firewall Configuration Options | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| What Are Ports and Port Scans | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Group Policy Settings for Server Management Control | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Defending the Boundary in Depth | Japanese | 2+/3 | Superior | Reading | Language Learning Object | |
| Log Analysis with SIEM | Japanese | 2+/3 | Superior | Reading | Language Learning Object |
Pagination
- First page
- Previous page
- …
- 27
- 28
- 29
- 30
- 31
- …
- Next page
- Last page