Lynda - Information Management Document Security/1.Introduction/01.Welcome.en.srt |
1 KB |
Lynda - Information Management Document Security/1.Introduction/01.Welcome.mp4 |
16.6 MB |
Lynda - Information Management Document Security/1.Introduction/02.Why security matters.en.srt |
4 KB |
Lynda - Information Management Document Security/1.Introduction/02.Why security matters.mp4 |
5.2 MB |
Lynda - Information Management Document Security/1.Introduction/03.Understanding security concerns.en.srt |
4 KB |
Lynda - Information Management Document Security/1.Introduction/03.Understanding security concerns.mp4 |
4.3 MB |
Lynda - Information Management Document Security/1.Introduction/04.Are your services secure.en.srt |
5 KB |
Lynda - Information Management Document Security/1.Introduction/04.Are your services secure.mp4 |
7.4 MB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/05.Understanding different server structures.en.srt |
3 KB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/05.Understanding different server structures.mp4 |
4.2 MB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/06.On-premises vs. cloud.en.srt |
4 KB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/06.On-premises vs. cloud.mp4 |
4.2 MB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/07.Layers of cloud security.en.srt |
4 KB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/07.Layers of cloud security.mp4 |
4.8 MB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/08.Levels of security classification.en.srt |
6 KB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/08.Levels of security classification.mp4 |
6.6 MB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/09.What's your data-retention policy.en.srt |
6 KB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/09.What's your data-retention policy.mp4 |
8.7 MB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/10.Compliance vs. best practices.en.srt |
4 KB |
Lynda - Information Management Document Security/2.1. Server and Security Basics/10.Compliance vs. best practices.mp4 |
5.2 MB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/11.Set security levels that make sense.en.srt |
5 KB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/11.Set security levels that make sense.mp4 |
5.8 MB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/12.Dealing with remote access.en.srt |
6 KB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/12.Dealing with remote access.mp4 |
7.3 MB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/13.Connecting systems.en.srt |
5 KB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/13.Connecting systems.mp4 |
6.6 MB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/14.Document control - Collaborative vs. protected.en.srt |
8 KB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/14.Document control - Collaborative vs. protected.mp4 |
14.4 MB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/15.Version control.en.srt |
6 KB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/15.Version control.mp4 |
7.7 MB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/16.Limiting executable code.en.srt |
4 KB |
Lynda - Information Management Document Security/3.2. Levels of Security and Permissions/16.Limiting executable code.mp4 |
4.9 MB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/17.Manage sharing permissions.en.srt |
5 KB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/17.Manage sharing permissions.mp4 |
6.1 MB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/18.Links, not attachments.en.srt |
4 KB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/18.Links, not attachments.mp4 |
5.2 MB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/19.Create separate spaces for external documents.en.srt |
3 KB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/19.Create separate spaces for external documents.mp4 |
4.2 MB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/20.Choose reliable services.en.srt |
5 KB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/20.Choose reliable services.mp4 |
6.2 MB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/21.Plug-ins and add-ons.en.srt |
3 KB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/21.Plug-ins and add-ons.mp4 |
5.7 MB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/22.Ongoing employee awareness.en.srt |
5 KB |
Lynda - Information Management Document Security/4.3. Best Practices for Document Security/22.Ongoing employee awareness.mp4 |
6.7 MB |
Lynda - Information Management Document Security/5.Conclusion/23.Next steps.en.srt |
2 KB |
Lynda - Information Management Document Security/5.Conclusion/23.Next steps.mp4 |
2.9 MB |