Catalog
Displaying 1926 - 1950 of 2152 (page 78 of 87)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Understanding Port Scanning | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Policies for Allocating Privileges | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Turkey's Foreign Policies | Turkish | 2+/3 | Superior | Listening | Language Learning Object | |
Turkey's Mediation Efforts | Turkish | 2+/3 | Superior | Listening | Language Learning Object | |
International Response to Conflict in Syria | Turkish | 2+/3 | Superior | Listening | Language Learning Object | |
International Implications of the Syrian Uprising | Turkish | 2+/3 | Superior | Listening | Language Learning Object | |
The Syrian Uprising and Turkey | Turkish | 2+/3 | Superior | Listening | Language Learning Object | |
Firewalls, Filtering, and Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Choosing the Right Monitoring Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Better Access Control with DAC | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Advancing Account Security with INTERSECT | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Data in the Cloud | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Attack Scenarios and Required Actions | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Secure Server Configurations Using Windows 2016 DNS Policies | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Getting Value out of Penetration Testing | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Configuration of a DHCP Server | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Cyber Hygiene for Cyber Safety | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Rules for Network Security | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Mitigating Vulnerabilities and Using Vulnerability Assessment | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Technical Specifications for Security (Antivirus) Software | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Securing Web Applications | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Fortinet | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
The Mirsis Backup Solution | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Recommendations for Reducing Risk | Turkish | 2+/3 | Superior | Reading | Language Learning Object | |
Device and Network Security Guidelines | Turkish | 2+/3 | Superior | Reading | Language Learning Object |
Pagination
- First page
- Previous page
- …
- 76
- 77
- 78
- 79
- 80
- …
- Next page
- Last page