Catalog
Displaying 1341 - 1350 of 7201 (page 135 of 721)
| Title | Language | ILR | ACTFL | Modality | Type | |
|---|---|---|---|---|---|---|
| Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| How to Keep Data Safe | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Tips for Effective Incident Response | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
| Parameters of Pen Testing | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object |
Pagination
- First page
- Previous page
- …
- 133
- 134
- 135
- 136
- 137
- …
- Next page
- Last page