MERLOT - Multimedia Education Resource for Learning and Online Teaching
Home Communities Learning Materials Member Directory My Profile About Us

Learning Materials

Become a Member | Log In

Browse Path: All > Science and Technology > Information Technology > Security

Contribute a Material

Information Technology

Material Types

Contribute a Material

:
:
Items 1 - 10 shown of 32 results

Author: Computer Knowledge
This is a tutorial on computer viruses. It discusses what computer viruses are, gives some history, and...
Type: Tutorial
Date Added: Mar 24, 2001
Date Modified: Jan 23, 2013
 
Peer Review (1)5 stars
Comments (12)avg: 4 stars
Personal Collections (16)
Learning Exercises (none)
Accessibility Info (none)

Author: Gary Kessler
A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES,...
Type: Tutorial
Date Added: Dec 30, 2002
Date Modified: Oct 04, 2010
 
Peer Review (1)5 stars
Comments (1)avg: 4 stars
Personal Collections (7)
Learning Exercises (none)
Accessibility Info (none)

Author: Corinne Hoisington
A video discussion of encryption over the Internet for beginners
Type: Presentation
Date Added: Mar 30, 2005
Date Modified: Oct 25, 2012
 
Peer Review (1)5 stars
Comments (1)avg: 2 stars
Personal Collections (5)
Learning Exercises (none)
Accessibility Info (none)

Author: United States Computer Emergency Readiness Team
the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues...
Type: Presentation
Date Added: Apr 27, 2005
Date Modified: Mar 26, 2012
 
Peer Review (1)5 stars
Comments (1)avg: 4 stars
Personal Collections (4)
Learning Exercises (none)
Accessibility Info (none)

Author: Matt Rose
This demonstration module provides an overview of the key concepts and goals of information security and...
Type: Collection
Date Added: Jan 16, 2003
Date Modified: Oct 07, 2011
 
Peer Review (1)4.27 stars
Comments (none)
Personal Collections (17)
Learning Exercises (none)
Accessibility Info (none)

Author: Cory Lammers
Basic tips for protecting electronic data at work.
Type: Tutorial
Date Added: Apr 26, 2012
Date Modified: May 02, 2012
 
Peer Reviews (not reviewed)
Comments (2)avg: 5 stars
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Author: Harry Lewis, Hal Abelson, Ken Ledeen
This is a free, online textbook.  ״Wherever you go‚ whatever you say, write, photograph, or buy‚ whatever...
Type: Open Textbook
Date Added: Feb 23, 2010
Date Modified: Jul 21, 2012
 
Peer Reviews (not reviewed)
Comments (1)avg: 5 stars
Personal Collections (4)
Learning Exercises (none)
Accessibility Info (1)

Author: Azubike Okpalaeze
Computer Crimes: Security Implications to Minimizing Vulnerability There are seven common online blunders...
Type: Assessment Tool
Date Added: Oct 06, 2009
Date Modified: Jul 02, 2012
 
Peer Reviews (not reviewed)
Comments (1)avg: 5 stars
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (1)

Author: Matt Rose
These preview video clips feature authoritative experts in information security and assurance. The...
Type: Presentation
Date Added: Jan 16, 2003
Date Modified: Oct 09, 2011
 
Peer Reviews (not reviewed)
Comments (none)
Personal Collections (3)
Learning Exercises (none)
Accessibility Info (none)

Author: Microsoft Corporation
This site gives information about the significance of software updates and a firewall in protecting the...
Type: Tutorial
Date Added: May 05, 2005
Date Modified: Apr 10, 2009
 
Peer Reviews (not reviewed)
Comments (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)
Results page 1 of 4
2  3  4  Next 
RSS