Catalog
Displaying 926 - 950 of 1091 (page 38 of 44)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Web Application Authentication Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Essential Tool for Wi-Fi Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
VMware vSphere Data Protection | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Importance of Information Security Awareness | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Smart Firewall Management | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Policies for Allocating Privileges | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Securing Web Applications | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Fortinet | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Mirsis Backup Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Recommendations for Reducing Risk | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Device and Network Security Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination
- First page
- Previous page
- …
- 36
- 37
- 38
- 39
- 40
- …
- Next page
- Last page