Search for tag: "computer virus"

IT Pro Water Cooler - June 2017 - Security, Pt. 1

In part one of June 13th's security themed water cooler event, Nathan Byrer and Tim Goth (Security affinity group) give an overview of NMap. Kim Milford (REN-ISAC) gives her "state of the…

From  Group IT Community Partnerships 25 plays 0  

The Road to Adaptive Reuse_20170301.mp4

The road to adaptive reuse: The integration of sustainable design, the triple bottom line, and technology in the Studebaker Redevelopment Initiative – The Renaissance District, an 80 city block…

From  Krista Bailey 6 plays 0  

W200 08-2 Managerial Ethics

From  James Adoba 136 plays 0  

X100 08-2 Managerial Ethics

Lecture 8: Organizational Issues & Styles

From  James Adoba 20 plays 0  

Use of Administrative Accounts

Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least Privilege: kb.iu.edu/d/amsv…

From  Group IT Training Video 285 plays 0  

CE090616_20160906.mp4

Scheduled recording

From  Fredrik Skarstedt 0 plays 0  

Trujillo, C - Crisis Management Exercise – IU-IDB SSFP

From  Group Media 3 plays 0  

1992 - Indiana Law 150th Anniversary - David Baker

"Celebration in Three Movements" with an introduction by Dean Fred Aman.

From  Group Maurer AV 7 plays 0  

Disaster Recovery and Business Continuity Planning

Links in this video:Protect IU website: protect.iu.edu Disaster Recovery Planning resources: go.iu.edu/dr-plan Business Continuity Planning help and resources: go.iu.edu/bc-plan Contacts mentioned in…

From  Group IT Training Video 167 plays 0