资源详情

返回首页 | 相关搜索
Lynda - Information Management Document Security
大小 151.02 MB
文件数 46
Info Hash: 113FC463C40BA836D671DE37C44A6EC0B9CD8156
收录时间 2026-01-15 08:01:19
更新时间 2026-01-15 08:01:23
文件列表 (46)
1.Introduction/01.Welcome.en.srt
1.43 KB
1.Introduction/01.Welcome.mp4
16.62 MB
1.Introduction/02.Why security matters.en.srt
4.32 KB
1.Introduction/02.Why security matters.mp4
5.25 MB
1.Introduction/03.Understanding security concerns.en.srt
3.66 KB
1.Introduction/03.Understanding security concerns.mp4
4.26 MB
1.Introduction/04.Are your services secure.en.srt
5.2 KB
1.Introduction/04.Are your services secure.mp4
7.43 MB
2.1. Server and Security Basics/05.Understanding different server structures.en.srt
3.49 KB
2.1. Server and Security Basics/05.Understanding different server structures.mp4
4.24 MB
2.1. Server and Security Basics/06.On-premises vs. cloud.en.srt
3.51 KB
2.1. Server and Security Basics/06.On-premises vs. cloud.mp4
4.18 MB
2.1. Server and Security Basics/07.Layers of cloud security.en.srt
4.17 KB
2.1. Server and Security Basics/07.Layers of cloud security.mp4
4.77 MB
2.1. Server and Security Basics/08.Levels of security classification.en.srt
5.67 KB
2.1. Server and Security Basics/08.Levels of security classification.mp4
6.63 MB
2.1. Server and Security Basics/09.What's your data-retention policy.en.srt
5.55 KB
2.1. Server and Security Basics/09.What's your data-retention policy.mp4
8.68 MB
2.1. Server and Security Basics/10.Compliance vs. best practices.en.srt
4.14 KB
2.1. Server and Security Basics/10.Compliance vs. best practices.mp4
5.24 MB
3.2. Levels of Security and Permissions/11.Set security levels that make sense.en.srt
4.8 KB
3.2. Levels of Security and Permissions/11.Set security levels that make sense.mp4
5.75 MB
3.2. Levels of Security and Permissions/12.Dealing with remote access.en.srt
5.96 KB
3.2. Levels of Security and Permissions/12.Dealing with remote access.mp4
7.27 MB
3.2. Levels of Security and Permissions/13.Connecting systems.en.srt
4.66 KB
3.2. Levels of Security and Permissions/13.Connecting systems.mp4
6.57 MB
3.2. Levels of Security and Permissions/14.Document control - Collaborative vs. protected.en.srt
7.56 KB
3.2. Levels of Security and Permissions/14.Document control - Collaborative vs. protected.mp4
14.4 MB
3.2. Levels of Security and Permissions/15.Version control.en.srt
5.53 KB
3.2. Levels of Security and Permissions/15.Version control.mp4
7.7 MB
3.2. Levels of Security and Permissions/16.Limiting executable code.en.srt
3.78 KB
3.2. Levels of Security and Permissions/16.Limiting executable code.mp4
4.88 MB
4.3. Best Practices for Document Security/17.Manage sharing permissions.en.srt
4.66 KB
4.3. Best Practices for Document Security/17.Manage sharing permissions.mp4
6.08 MB
4.3. Best Practices for Document Security/18.Links, not attachments.en.srt
3.84 KB
4.3. Best Practices for Document Security/18.Links, not attachments.mp4
5.22 MB
4.3. Best Practices for Document Security/19.Create separate spaces for external documents.en.srt
3.3 KB
4.3. Best Practices for Document Security/19.Create separate spaces for external documents.mp4
4.23 MB
4.3. Best Practices for Document Security/20.Choose reliable services.en.srt
5.22 KB
4.3. Best Practices for Document Security/20.Choose reliable services.mp4
6.2 MB
4.3. Best Practices for Document Security/21.Plug-ins and add-ons.en.srt
3.49 KB
4.3. Best Practices for Document Security/21.Plug-ins and add-ons.mp4
5.72 MB
4.3. Best Practices for Document Security/22.Ongoing employee awareness.en.srt
5.48 KB
4.3. Best Practices for Document Security/22.Ongoing employee awareness.mp4
6.73 MB
5.Conclusion/23.Next steps.en.srt
2.46 KB
5.Conclusion/23.Next steps.mp4
2.87 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。