iNFekt and jane are able to display the NFOs inside SRRs.
  • U: Anonymous
  • D: 2018-07-19 12:46:13
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 ZH File size CRC
Download
10,665
Stored files
1,261 A0C01DD8
112 957B5B9B
RAR-files
limds-7710-zh.rar 50,000,000 1112D203
limds-7710-zh.r00 50,000,000 84EE8BC5
limds-7710-zh.r01 50,000,000 509DF657
limds-7710-zh.r02 8,367,520 3DD9669A

Total size: 158,367,520
Archived files
Information Management - Document Security\1.Introduction\02.Why security matters.mp4 [f970cd66d7a35e10] 5,500,559 77185303
Information Management - Document Security\1.Introduction\01.Welcome.en.srt 1,464 77805B44
Information Management - Document Security\1.Introduction\02.Why security matters.en.srt 4,425 14655799
Information Management - Document Security\1.Introduction\03.Understanding security concerns.en.srt 3,747 394064A3
Information Management - Document Security\1.Introduction\01.Welcome.mp4 [c660ae557bcb31bd] 17,423,147 2E5A3A42
Information Management - Document Security\1.Introduction\03.Understanding security concerns.mp4 [25de4a0bfd3c148e] 4,469,688 E28F5FE6
Information Management - Document Security\1.Introduction\04.Are your services secure.mp4 [b38e5011b54624df] 7,786,751 7024B7D9
Information Management - Document Security\1.Introduction\04.Are your services secure.en.srt 5,320 6A76D877
Information Management - Document Security\5.Conclusion\23.Next steps.mp4 [fae4d46ef44f8420] 3,014,612 735AA20E
Information Management - Document Security\5.Conclusion\23.Next steps.en.srt 2,521 6FB9C7A5
Information Management - Document Security\4.3. Best Practices for Document Security\19.Create separate spaces for external documents.mp4 [ba1457de53605618] 4,436,875 0EE33330
Information Management - Document Security\4.3. Best Practices for Document Security\22.Ongoing employee awareness.en.srt 5,607 E69CBC49
Information Management - Document Security\4.3. Best Practices for Document Security\21.Plug-ins and add-ons.mp4 [6a22f8764973b81d] 5,995,048 5B4997A8
Information Management - Document Security\4.3. Best Practices for Document Security\17.Manage sharing permissions.en.srt 4,776 E9A66F60
Information Management - Document Security\4.3. Best Practices for Document Security\18.Links, not attachments.mp4 [fe3c756848c36366] 5,478,505 72DD88D5
Information Management - Document Security\4.3. Best Practices for Document Security\22.Ongoing employee awareness.mp4 [2cec25d4ebea2f2] 7,058,199 B5588290
Information Management - Document Security\4.3. Best Practices for Document Security\20.Choose reliable services.en.srt 5,341 D8367E03
Information Management - Document Security\4.3. Best Practices for Document Security\17.Manage sharing permissions.mp4 [15a061b7d06eaf6f] 6,376,552 43E1E03C
Information Management - Document Security\4.3. Best Practices for Document Security\18.Links, not attachments.en.srt 3,932 3F7CF170
Information Management - Document Security\4.3. Best Practices for Document Security\20.Choose reliable services.mp4 [8716142f035a3428] 6,499,919 D7B0052C
Information Management - Document Security\4.3. Best Practices for Document Security\19.Create separate spaces for external documents.en.srt 3,375 F6069858
Information Management - Document Security\4.3. Best Practices for Document Security\21.Plug-ins and add-ons.en.srt 3,574 2A4D949B
Information Management - Document Security\2.1. Server and Security Basics\10.Compliance vs. best practices.en.srt 4,235 6225810C
Information Management - Document Security\2.1. Server and Security Basics\08.Levels of security classification.en.srt 5,809 B1933168
Information Management - Document Security\2.1. Server and Security Basics\06.On-premises vs. cloud.mp4 [bcda3fe1801ef18b] 4,377,832 D848E2AD
Information Management - Document Security\2.1. Server and Security Basics\07.Layers of cloud security.mp4 [123ca339b59c1aee] 5,001,001 08D45E98
Information Management - Document Security\2.1. Server and Security Basics\08.Levels of security classification.mp4 [c510e388aa1b3977] 6,956,608 3D19845C
Information Management - Document Security\2.1. Server and Security Basics\09.What's your data-retention policy.en.srt 5,683 7D3AD07D
Information Management - Document Security\2.1. Server and Security Basics\10.Compliance vs. best practices.mp4 [acb889d2c4426ddd] 5,494,645 D0292439
Information Management - Document Security\2.1. Server and Security Basics\06.On-premises vs. cloud.en.srt 3,593 B15FF2D7
Information Management - Document Security\2.1. Server and Security Basics\09.What's your data-retention policy.mp4 [15c9084592f33cd0] 9,102,394 21A47F26
Information Management - Document Security\2.1. Server and Security Basics\07.Layers of cloud security.en.srt 4,273 7F8A720E
Information Management - Document Security\2.1. Server and Security Basics\05.Understanding different server structures.mp4 [9fbb27e4e50f702b] 4,444,769 6D31037E
Information Management - Document Security\2.1. Server and Security Basics\05.Understanding different server structures.en.srt 3,578 C7E932C6
Information Management - Document Security\3.2. Levels of Security and Permissions\14.Document control - Collaborative vs. protected.en.srt 7,743 604A7C00
Information Management - Document Security\3.2. Levels of Security and Permissions\16.Limiting executable code.en.srt 3,875 C98E2125
Information Management - Document Security\3.2. Levels of Security and Permissions\14.Document control - Collaborative vs. protected.mp4 [8dda73ff19e83c8e] 15,098,168 6A5D4A3A
Information Management - Document Security\3.2. Levels of Security and Permissions\12.Dealing with remote access.mp4 [ccd0ff4222fc4c83] 7,626,232 EA6F6916
Information Management - Document Security\3.2. Levels of Security and Permissions\13.Connecting systems.mp4 [2a3151514dd07a59] 6,888,738 A2554607
Information Management - Document Security\3.2. Levels of Security and Permissions\15.Version control.en.srt 5,660 13A5513A
Information Management - Document Security\3.2. Levels of Security and Permissions\13.Connecting systems.en.srt 4,767 1D70B140
Information Management - Document Security\3.2. Levels of Security and Permissions\16.Limiting executable code.mp4 [b7a56a9f2fd2d914] 5,121,412 8FDC4742
Information Management - Document Security\3.2. Levels of Security and Permissions\15.Version control.mp4 [f00f497443910099] 8,071,800 324B99A4
Information Management - Document Security\3.2. Levels of Security and Permissions\11.Set security levels that make sense.mp4 [81c700e1adec6113] 6,031,980 5764D4B2
Information Management - Document Security\3.2. Levels of Security and Permissions\12.Dealing with remote access.en.srt 6,107 98066ABA
Information Management - Document Security\3.2. Levels of Security and Permissions\11.Set security levels that make sense.en.srt 4,916 4DECE87F
Information Management - Document Security\1.Introduction 0 00000000
Information Management - Document Security\5.Conclusion 0 00000000
Information Management - Document Security\4.3. Best Practices for Document Security 0 00000000
Information Management - Document Security\2.1. Server and Security Basics 0 00000000
Information Management - Document Security\3.2. Levels of Security and Permissions 0 00000000
Information Management - Document Security 0 00000000

Total size: 158,359,755
RAR Recovery
Not Present
Labels UNKNOWN