MERLOT - Multimedia Education Resource for Learning and Online Teaching
Home Communities Learning Materials Member Directory My Profile About Us

Learning Materials

Become a Member | Log In

Browse Path: All > Science and Technology > Information Technology > Security

Contribute a Material

Information Technology

Material Types

Contribute a Material

:
:
Items 1 - 10 shown of 33 results

Author: Computer Knowledge
This is a tutorial on computer viruses. It discusses what computer viruses are, gives some history, and...
Type: Tutorial
Date Added: Mar 24, 2001
Date Modified: Mar 09, 2013
 
Peer Review 5 stars
Comments (12)avg: 4 stars
Personal Collections (15)
Learning Exercises (none)
Accessibility Info (none)

Author: Matt Rose
This demonstration module provides an overview of the key concepts and goals of information security and...
Type: Collection
Date Added: Jan 16, 2003
Date Modified: Oct 07, 2011
 
Peer Review 4.27 stars
Comments (none)
Personal Collections (17)
Learning Exercises (none)
Accessibility Info (none)

Author: Gary Kessler
A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES,...
Type: Tutorial
Date Added: Dec 30, 2002
Date Modified: Oct 04, 2010
 
Peer Review 5 stars
Comments (1)avg: 4 stars
Personal Collections (7)
Learning Exercises (none)
Accessibility Info (none)

Author: Corinne Hoisington
A video discussion of encryption over the Internet for beginners
Type: Presentation
Date Added: Mar 30, 2005
Date Modified: Oct 25, 2012
 
Peer Review 5 stars
Comments (1)avg: 2 stars
Personal Collections (5)
Learning Exercises (none)
Accessibility Info (none)

Author: United States Computer Emergency Readiness Team
the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues...
Type: Presentation
Date Added: Apr 27, 2005
Date Modified: Mar 26, 2012
 
Peer Review 5 stars
Comments (1)avg: 4 stars
Personal Collections (4)
Learning Exercises (none)
Accessibility Info (none)

Author: Gary Kessler
Created as a training tool for computer forensics technicians, this website provides an abundance of...
Type: Presentation
Date Added: Dec 01, 2007
Date Modified: Feb 17, 2012
 
Peer Reviews (not reviewed)
Comments (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)

Author: Carnegie Mellon University
Anti-Phishing Phil is an interactive game that teaches users how to identify phishing URLs, where to look...
Type: Tutorial
Date Added: Sep 26, 2007
Date Modified: May 18, 2010
 
Peer Reviews (not reviewed)
Comments (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)

Author: Harry Lewis, Hal Abelson, Ken Ledeen
This is a free, online textbook.  ״Wherever you go‚ whatever you say, write, photograph, or buy‚ whatever...
Type: Open Textbook
Date Added: Feb 23, 2010
Date Modified: Jul 21, 2012
 
Peer Reviews (not reviewed)
Comments (1)avg: 5 stars
Personal Collections (4)
Learning Exercises (none)
Accessibility Info (1)

Author: Azubike Okpalaeze
Computer Crimes: Security Implications to Minimizing Vulnerability There are seven common online blunders...
Type: Assessment Tool
Date Added: Oct 06, 2009
Date Modified: Jul 02, 2012
 
Peer Reviews (not reviewed)
Comments (1)avg: 5 stars
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (1)

Author: Matt Rose
Employees are your best firewall?..or they should be anyway. This 27 minute module highlights how to...
Type: Presentation
Date Added: Jan 16, 2003
Date Modified: Oct 12, 2005
 
Peer Reviews (not reviewed)
Comments (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)
Results page 1 of 4
2  3  4  Next 
RSS
--%>