Catalog
Displaying 201 - 225 of 377 (page 9 of 16)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Ten Suggestions on Cybersecurity | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The Growing Use of WIPS | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Personal Information Exposure | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Business Account Management | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Defending Automation | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Comprehensive Solutions | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Improving the Network Security of Businesses | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Trends in Enterprise Account Management | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The Necessity of Traffic Analysis in SIEM | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Adjusting Security Focus | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The Importance of Data Encryption | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Information Security and Kookmin Bank | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
Securing Mobile Devices | Korean | 2+/3 | Superior | Reading | Language Learning Object | |
The Security Cycle | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
White Lists | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Password Policies | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Web Application Firewalls | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Anti-Malware Software | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Intrusion and Data Theft | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Wireless Network Security | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Data Corruption | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
The Costs of a Data Breach | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Vulnerable Office Equipment | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Port Filtering | Persian | 2+/3 | Superior | Reading | Language Learning Object | |
Establishing a LUA Environment | Persian | 2+/3 | Superior | Reading | Language Learning Object |
Pagination