SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Partnering With Vendors
to Limit Compromised
User Accounts
Richard Guajardo, University of Houston
Don Hamparian, OCLC
Peter Katz, Elsevier
June 9, 2017
Indianapolis, IN
Topics
• UH Experience
• Excessive Use vs. Systematic Downloading
• Triggers of Excessive Use
• Addressing the Issue
– Proxy Logs
– Vendor Communication
– Broader Security Implications
From:	ipblock@acs.org	[ipblock@acs.org]	
Sent:	Tuesday,	June	28,	2016	11:28	PM	
Subject:	ACS	Notification	of	IP	block	for	excessive	downloads	
	
Dear	Librarian,	
	
This	is	to	notify	you	that	IP	address	XXX.X.XXX.XX	associated	with	your	
organization,	UNIV	OF	HOUSTON	MAIN,	has	been	blocked	from	accessing	
content	on	the	ACS	Publications	website	due	to	an	excessive	downloads	
violation.	The	unauthorized	activity	that	resulted	in	this	IP	block	
occurred	at	Wednesday,	June	29,	2016	4:26:28	AM	UTC.	To	restore	access	
to	the	IP	address,	please	investigate	the	situation,	and	inform	us	of	
your	findings.	
	
Unfortunately,	valid	users	from	your	institution	might	also	be	blocked	
if	they	use	the	same	IP	address,	or	if	the	account	is	set	up	using	a	
proxy	IP	address.	
	
Please	investigate	and	contact	ACS	directly	at	ipblock@acs.org	to	
request	restoration.	This	IP	address	will	remain	blocked	until	ACS	
Publications	is	contacted	and	the	situation	is	satisfactorily	resolved.	
	
We	apologize	for	the	inconvenience.	Thank	you	again	for	your	support	of	
the	ACS	Publications	program.	
	
Sincerely,	
The	Sales	Operations	Support	Team	
	
	
UH Experience
Excessive Use vs. Systematic Downloading
Systematic downloading is excessive use, but not all cases
of excessive use are systematic downloading.
Icons made by Lyolya from www.flaticon.com is licensed by CC 3.0
Excessive Use is . . .
• Not always intentional
• Can be legitimate research
• Usually determined by the vendor
– Each vendor establishes their own threshold for excessive use
– Usually defined by number of downloads within a specific time frame
– Vendors, understandably, do not share what their established threshold
Systematic Downloading
• Is intentional
• Is often scripted
• Can affect multiple platforms simultaneously
• Typically not our patrons
• Usually caused by compromised accounts
Excessive Use: Triggers
• Users sharing account information
• Phishing
• Compromised workstation
• On-campus Wi-Fi access
• Citation Tools (Endnote, Zotero, etc.)
Icons made by Scott de Jong from www.flaticon.com is licensed by CC 3.0
Addressing the Issue
• Proactively Check Server Status – Sessions Active over 24 hours -
– Note Session ID
– Terminate session
– Search Logs to Determine if Account Could be Compromised
• Reacting to Vendor Notification
– Request additional information (Date, Time, Log Activity)
– Use information to Query Proxy Logs
– Identifying the User
• If Account is Compromised
– Block User in Proxy Server
– Notify Library and Campus IT
– Campus IT Contacts User
– Unblock User After Notification from Campus IT
Proxy Log Files
Vendor Communication
• Notification from Vendor
• Request for Additional Information from Vendor
• Follow-up with Vendor
• Restoration of Access
Internal Communicating: High Impact Incidents
• Communication with Subject Liaisons
• Checking in with Library Administration
• Key Library Staff
• Other users (Faculty, Staff Students)
Partnering with Campus IT
• Meeting with Campus IT Security Office
• Compromised faculty/staff accounts
• Campus IT being proactive
– Following Know Hacker Sites
– Keeping the Library in the Loop
Meeting with Campus IT Security
• Provide log files and timeline of event
• Campus will query other campus systems accessed
during the same time frame by the same user account
• Admissions, Registration, Academic Grading System
• Time-sensitive response
Memo to Campus IT
We believe the Cougarnet accounts listed below may have been compromised.
UH Libraries contracts with various vendors to provide access to electronic articles
and electronic books. In early July we were contacted by one of our vendors about
excessive use or mass downloading of content, which is considered a breach of
contract. Based on the information provided by the vendor and a review of our
logs (attached), we were able to determine that four accounts were being used. A
separate email will be sent containing the log files and username of the remaining
two accounts.
The user accounts are:
xxxxxxxx
xxxxxxxx
We have restricted access to library resources for this account, and would
appreciate notification when it has been cleared so that we can restore access. If
you need additional information, please let me know.
Memo to Campus IT
It looks as if the following student account may have been compromised. It
was discovered while doing some follow up on an earlier incident reported by a
vendor. It follows the same pattern of other accounts that were
compromised—the presence of multiple IPs for a single session, most of which
originate outside the country (see attached log files).
The user account is: xxxxxxxx
We have restricted access to library resources for this account, and would
appreciate notification when it has been cleared so that we can restore access.
If you need additional information, please let me know.
Memo to Campus IT
We believe the following student account may have been compromised:
xxxxxxxx
Based on the frequency of these occurrences lately, we are monitoring our logs
more closely so that we can catch unusual activity before it reaches the
vendor. It seems that as soon as one user account is addressed, another
account is discovered. We have restricted access to library resources for this
account. Please let us know when this account has been cleared so that we can
restore access.
Response From Campus IT
We spoke with this user and gave her phishing awareness training. Her
password has been reset. You can restore her access to Library resources.
Thanks
Q&A:
Partnering With Vendors to Limit Compromised User
Accounts
Richard Guajardo (guajardo@uh.edu), University of Houston
Don Hamparian (hamparid@oclc.org), OCLC
Peter Katz (p.katz@elsevier.com), Elsevier
Thank You for Attending.

Weitere ähnliche Inhalte

Ähnlich wie Partnering With Vendors to Limit Compromised User Accounts - Richard Guajardo

ResearchGate, SciHub, and Beyond: Sharing Scholarly Work Legally
ResearchGate, SciHub, and Beyond: Sharing Scholarly Work LegallyResearchGate, SciHub, and Beyond: Sharing Scholarly Work Legally
ResearchGate, SciHub, and Beyond: Sharing Scholarly Work LegallyErin Owens
 
Page Not Found; Creating a troubleshooting workflow for your library
Page Not Found; Creating a troubleshooting workflow for your libraryPage Not Found; Creating a troubleshooting workflow for your library
Page Not Found; Creating a troubleshooting workflow for your libraryRachel Becker
 
Exploring Perpetual Access
Exploring Perpetual AccessExploring Perpetual Access
Exploring Perpetual AccessNASIG
 
Library management system basic points
Library management system basic pointsLibrary management system basic points
Library management system basic pointsUmer Awan
 
Remote access to electronic resources
Remote access to electronic resourcesRemote access to electronic resources
Remote access to electronic resourcesmamboxena
 
Developing Infrastructure to Support Closer Collaboration of Aggregators with...
Developing Infrastructure to Support Closer Collaboration of Aggregators with...Developing Infrastructure to Support Closer Collaboration of Aggregators with...
Developing Infrastructure to Support Closer Collaboration of Aggregators with...Nancy Pontika
 
JISC License Workshop
JISC License WorkshopJISC License Workshop
JISC License WorkshopJISC.AM
 
Selection and Acquisition of Print / Electronic Serials
Selection and Acquisition of Print / Electronic SerialsSelection and Acquisition of Print / Electronic Serials
Selection and Acquisition of Print / Electronic SerialsAllana Delgado
 
All About E Resources
All About E ResourcesAll About E Resources
All About E ResourcesLouise Penn
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management SystemHeather Strinden
 
Access Lab 2020: Switching from EzProxy to OpenAthens
Access Lab 2020: Switching from EzProxy to OpenAthensAccess Lab 2020: Switching from EzProxy to OpenAthens
Access Lab 2020: Switching from EzProxy to OpenAthensOpenAthens
 
College Application Essay 2016
College Application Essay 2016College Application Essay 2016
College Application Essay 2016April Bergseth
 
HP ArcSight & Ayehu eyeShare - Security Automation
HP ArcSight & Ayehu eyeShare - Security AutomationHP ArcSight & Ayehu eyeShare - Security Automation
HP ArcSight & Ayehu eyeShare - Security Automationcohen88or
 
Six important factors to consider before choosing a technology jon solomon
Six important factors to consider before choosing a technology   jon solomonSix important factors to consider before choosing a technology   jon solomon
Six important factors to consider before choosing a technology jon solomon Colorado State Library
 
Institutional Identifiers internally and throughout the supply chain
Institutional Identifiers internally and throughout the supply chainInstitutional Identifiers internally and throughout the supply chain
Institutional Identifiers internally and throughout the supply chainRinggold Inc
 

Ähnlich wie Partnering With Vendors to Limit Compromised User Accounts - Richard Guajardo (20)

ResearchGate, SciHub, and Beyond: Sharing Scholarly Work Legally
ResearchGate, SciHub, and Beyond: Sharing Scholarly Work LegallyResearchGate, SciHub, and Beyond: Sharing Scholarly Work Legally
ResearchGate, SciHub, and Beyond: Sharing Scholarly Work Legally
 
Incommon overview
Incommon overviewIncommon overview
Incommon overview
 
Page Not Found; Creating a troubleshooting workflow for your library
Page Not Found; Creating a troubleshooting workflow for your libraryPage Not Found; Creating a troubleshooting workflow for your library
Page Not Found; Creating a troubleshooting workflow for your library
 
Exploring Perpetual Access
Exploring Perpetual AccessExploring Perpetual Access
Exploring Perpetual Access
 
Library management system basic points
Library management system basic pointsLibrary management system basic points
Library management system basic points
 
Remote access to electronic resources
Remote access to electronic resourcesRemote access to electronic resources
Remote access to electronic resources
 
Developing Infrastructure to Support Closer Collaboration of Aggregators with...
Developing Infrastructure to Support Closer Collaboration of Aggregators with...Developing Infrastructure to Support Closer Collaboration of Aggregators with...
Developing Infrastructure to Support Closer Collaboration of Aggregators with...
 
JISC License Workshop
JISC License WorkshopJISC License Workshop
JISC License Workshop
 
Nance "Demystifying Resource Sharing"
Nance "Demystifying Resource Sharing"Nance "Demystifying Resource Sharing"
Nance "Demystifying Resource Sharing"
 
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
 
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
Singley "Building Privacy Infrastructure - An Academic Library’s Perspective"
 
Selection and Acquisition of Print / Electronic Serials
Selection and Acquisition of Print / Electronic SerialsSelection and Acquisition of Print / Electronic Serials
Selection and Acquisition of Print / Electronic Serials
 
All About E Resources
All About E ResourcesAll About E Resources
All About E Resources
 
11 Project-Online Library Management System
11 Project-Online Library Management System11 Project-Online Library Management System
11 Project-Online Library Management System
 
Access Lab 2020: Switching from EzProxy to OpenAthens
Access Lab 2020: Switching from EzProxy to OpenAthensAccess Lab 2020: Switching from EzProxy to OpenAthens
Access Lab 2020: Switching from EzProxy to OpenAthens
 
College Application Essay 2016
College Application Essay 2016College Application Essay 2016
College Application Essay 2016
 
FBI Ransomware Report
FBI Ransomware ReportFBI Ransomware Report
FBI Ransomware Report
 
HP ArcSight & Ayehu eyeShare - Security Automation
HP ArcSight & Ayehu eyeShare - Security AutomationHP ArcSight & Ayehu eyeShare - Security Automation
HP ArcSight & Ayehu eyeShare - Security Automation
 
Six important factors to consider before choosing a technology jon solomon
Six important factors to consider before choosing a technology   jon solomonSix important factors to consider before choosing a technology   jon solomon
Six important factors to consider before choosing a technology jon solomon
 
Institutional Identifiers internally and throughout the supply chain
Institutional Identifiers internally and throughout the supply chainInstitutional Identifiers internally and throughout the supply chain
Institutional Identifiers internally and throughout the supply chain
 

Mehr von NASIG

Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...NASIG
 
The Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of CatalogersThe Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of CatalogersNASIG
 
Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...NASIG
 
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...NASIG
 
Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments NASIG
 
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...NASIG
 
Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials NASIG
 
Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...NASIG
 
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...NASIG
 
Bloomsbury digital resources
Bloomsbury digital resourcesBloomsbury digital resources
Bloomsbury digital resourcesNASIG
 
Web accessibility in the institutional repository crafting user centered sub...
Web accessibility in the institutional repository  crafting user centered sub...Web accessibility in the institutional repository  crafting user centered sub...
Web accessibility in the institutional repository crafting user centered sub...NASIG
 
Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries NASIG
 
Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration NASIG
 
Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?NASIG
 
Mapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing ChangeMapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing ChangeNASIG
 
When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020NASIG
 
Getting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides ContentGetting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides ContentNASIG
 
A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...NASIG
 
Knowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource ManagementKnowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource ManagementNASIG
 
Practical approaches to linked data
Practical approaches to linked dataPractical approaches to linked data
Practical approaches to linked dataNASIG
 

Mehr von NASIG (20)

Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
 
The Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of CatalogersThe Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of Catalogers
 
Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...
 
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
 
Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments
 
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
 
Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials
 
Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...
 
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
 
Bloomsbury digital resources
Bloomsbury digital resourcesBloomsbury digital resources
Bloomsbury digital resources
 
Web accessibility in the institutional repository crafting user centered sub...
Web accessibility in the institutional repository  crafting user centered sub...Web accessibility in the institutional repository  crafting user centered sub...
Web accessibility in the institutional repository crafting user centered sub...
 
Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries
 
Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration
 
Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?
 
Mapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing ChangeMapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing Change
 
When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020
 
Getting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides ContentGetting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides Content
 
A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...
 
Knowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource ManagementKnowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource Management
 
Practical approaches to linked data
Practical approaches to linked dataPractical approaches to linked data
Practical approaches to linked data
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Kürzlich hochgeladen (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Partnering With Vendors to Limit Compromised User Accounts - Richard Guajardo