Information Management_ Document Security\Ex_Files_Information_Management_Document_Security.zip |
28,472 |
EF4E3F9A |
Information Management_ Document Security\Information Management_ Document Security-description.txt |
0 |
00000000 |
Information Management_ Document Security\01 Introduction\001 Enhancing security through document protection.mp4
[5b3aa89dec88cd64]
|
5,138,432 |
C374A1C7 |
Information Management_ Document Security\01 Introduction\003 Understanding security concerns.mp4
[e7f245bee071da6d]
|
4,943,363 |
F5DFDF38 |
Information Management_ Document Security\01 Introduction\004 Are your services secure_-en.srt |
5,408 |
4C57E6CC |
Information Management_ Document Security\01 Introduction\002 Why security matters.mp4
[39dacd86d8b2a0e1]
|
6,861,656 |
18BA1EF0 |
Information Management_ Document Security\01 Introduction\003 Understanding security concerns-en.srt |
3,227 |
EEA35998 |
Information Management_ Document Security\01 Introduction\001 Enhancing security through document protection-en.srt |
1,565 |
54AD0094 |
Information Management_ Document Security\01 Introduction\004 Are your services secure_.mp4
[4e2811e7dfae9bcd]
|
8,695,638 |
C2590FBD |
Information Management_ Document Security\01 Introduction\002 Why security matters-en.srt |
4,443 |
F2E83D8E |
Information Management_ Document Security\04 Best Practices for Document Security\002 Links not attachments.mp4
[d3e6b796ac7c01d1]
|
7,359,319 |
B1BEFF8F |
Information Management_ Document Security\04 Best Practices for Document Security\005 Plug-ins and add-ons.mp4
[4de89d8e794ad7a5]
|
5,491,377 |
3FB84A61 |
Information Management_ Document Security\04 Best Practices for Document Security\001 Manage sharing permissions-en.srt |
4,835 |
A9271481 |
Information Management_ Document Security\04 Best Practices for Document Security\001 Manage sharing permissions.mp4
[fdb904d29f7f68df]
|
7,253,067 |
D998CA53 |
Information Management_ Document Security\04 Best Practices for Document Security\006 Ongoing employee awareness.mp4
[93a34633403e9950]
|
10,319,874 |
7A83B02D |
Information Management_ Document Security\04 Best Practices for Document Security\003 Create separate spaces for external documents-en.srt |
3,396 |
166FC707 |
Information Management_ Document Security\04 Best Practices for Document Security\006 Ongoing employee awareness-en.srt |
5,304 |
829FA60C |
Information Management_ Document Security\04 Best Practices for Document Security\002 Links not attachments-en.srt |
4,255 |
3FD187BC |
Information Management_ Document Security\04 Best Practices for Document Security\004 Choose reliable services.mp4
[216680edede0ab19]
|
8,016,732 |
7441E7BF |
Information Management_ Document Security\04 Best Practices for Document Security\003 Create separate spaces for external documents.mp4
[518f447bd3d95396]
|
5,919,064 |
E8FB734C |
Information Management_ Document Security\04 Best Practices for Document Security\005 Plug-ins and add-ons-en.srt |
3,716 |
3F1B7850 |
Information Management_ Document Security\04 Best Practices for Document Security\004 Choose reliable services-en.srt |
5,257 |
BD41B342 |
Information Management_ Document Security\05 Conclusion\001 Continue your data security learning.mp4
[3422dbe939b499a6]
|
5,037,910 |
4E18F980 |
Information Management_ Document Security\05 Conclusion\001 Continue your data security learning-en.srt |
2,691 |
B0B26DFE |
Information Management_ Document Security\03 Levels of Security and Permissions\003 Connecting systems-en.srt |
4,422 |
ED123344 |
Information Management_ Document Security\03 Levels of Security and Permissions\003 Connecting systems.mp4
[657cd89195635122]
|
7,502,681 |
0D308A10 |
Information Management_ Document Security\03 Levels of Security and Permissions\005 Version control.mp4
[398d85e2f3f1e5dd]
|
13,113,859 |
FA14AB0D |
Information Management_ Document Security\03 Levels of Security and Permissions\002 Dealing with remote access-en.srt |
5,870 |
F9212075 |
Information Management_ Document Security\03 Levels of Security and Permissions\001 Set security levels that make sense-en.srt |
5,043 |
C7F97CCC |
Information Management_ Document Security\03 Levels of Security and Permissions\006 Limiting executable code-en.srt |
3,981 |
90F9AC7B |
Information Management_ Document Security\03 Levels of Security and Permissions\004 Document control_ Collaborative vs. protected-en.srt |
7,163 |
CB8FACEC |
Information Management_ Document Security\03 Levels of Security and Permissions\002 Dealing with remote access.mp4
[5be334db5c4d3312]
|
11,199,965 |
B3AF845B |
Information Management_ Document Security\03 Levels of Security and Permissions\006 Limiting executable code.mp4
[ceca07f87316b8f8]
|
5,494,276 |
644A1C71 |
Information Management_ Document Security\03 Levels of Security and Permissions\001 Set security levels that make sense.mp4
[9c217755fff4f79a]
|
7,662,595 |
4EA53A3A |
Information Management_ Document Security\03 Levels of Security and Permissions\004 Document control_ Collaborative vs. protected.mp4
[9ff9241227fac78a]
|
11,754,843 |
2BA36250 |
Information Management_ Document Security\03 Levels of Security and Permissions\005 Version control-en.srt |
5,683 |
9E08C916 |
Information Management_ Document Security\02 Server and Security Basics\005 Whats your data-retention policy_-en.srt |
5,769 |
C4628D9D |
Information Management_ Document Security\02 Server and Security Basics\001 Understanding different server structures.mp4
[727529c571aa1909]
|
4,706,134 |
CE08F8C5 |
Information Management_ Document Security\02 Server and Security Basics\002 On-premises vs. cloud_-en.srt |
3,726 |
731E2AFE |
Information Management_ Document Security\02 Server and Security Basics\003 Layers of cloud security-en.srt |
4,204 |
AC79591F |
Information Management_ Document Security\02 Server and Security Basics\002 On-premises vs. cloud_.mp4
[383119ee8e533b4a]
|
5,591,233 |
0E0F27A6 |
Information Management_ Document Security\02 Server and Security Basics\006 Compliance vs. best practices-en.srt |
3,720 |
04E6C4D3 |
Information Management_ Document Security\02 Server and Security Basics\006 Compliance vs. best practices.mp4
[c06c7b68ddad61df]
|
5,737,138 |
36227197 |
Information Management_ Document Security\02 Server and Security Basics\005 Whats your data-retention policy_.mp4
[813e46faa1149f9]
|
11,971,760 |
4DC6B016 |
Information Management_ Document Security\02 Server and Security Basics\004 Levels of security classification-en.srt |
5,812 |
58BE6B34 |
Information Management_ Document Security\02 Server and Security Basics\001 Understanding different server structures-en.srt |
3,487 |
F633C719 |
Information Management_ Document Security\02 Server and Security Basics\003 Layers of cloud security.mp4
[a7df0af00f0f1704]
|
5,552,645 |
FF3F9F33 |
Information Management_ Document Security\02 Server and Security Basics\004 Levels of security classification.mp4
[d15b2ca83f8124f0]
|
8,134,830 |
F674FF03 |
Information Management_ Document Security\01 Introduction |
0 |
00000000 |
Information Management_ Document Security\04 Best Practices for Document Security |
0 |
00000000 |
Information Management_ Document Security\05 Conclusion |
0 |
00000000 |
Information Management_ Document Security\03 Levels of Security and Permissions |
0 |
00000000 |
Information Management_ Document Security\02 Server and Security Basics |
0 |
00000000 |
Information Management_ Document Security |
0 |
00000000 |
|
Total size: |
173,589,840 |
|