Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






    

Refine Your Search:

 
Materials 1 - 10 shown of 18 results

An Overview of Cryptography

A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES, Diffie-Hellman, and... see more
Material Type: Tutorial
Author: Gary Kessler
Date Added: Dec 30, 2002 Date Modified: Oct 04, 2010
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "An Overview of Cryptography"
User Rating for material titled "An Overview of Cryptography"
Member Comments for material titled "An Overview of Cryptography"
Bookmark Collections for material titled "An Overview of Cryptography"
Course ePortfolios for material titled "An Overview of Cryptography"
Learning Exercises for material titled "An Overview of Cryptography"
Accessibility Info for material titled "An Overview of Cryptography"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User review 4 average rating
User Rating 4 user rating
Discussion (1 Comment)
In (7)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Cryptography - Resources & History

This website contains a brief history of some vairous types of ciphers as well as explanations as to how they work along with... see more
Material Type: Reference Material
Author: Ralph Morelli
Date Added: Nov 19, 2005 Date Modified: Aug 26, 2013
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Cryptography - Resources & History"
User Rating for material titled "Cryptography - Resources & History"
Member Comments for material titled "Cryptography - Resources & History"
Bookmark Collections for material titled "Cryptography - Resources & History"
Course ePortfolios for material titled "Cryptography - Resources & History"
Learning Exercises for material titled "Cryptography - Resources & History"
Accessibility Info for material titled "Cryptography - Resources & History"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Introduction to Cryptography

This site provides a brief textual overview of the field of cryptography and related issues including popular techniques,... see more
Material Type: Presentation
Author: RSA Laboratories
Date Added: Aug 25, 2005 Date Modified: Jan 15, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Introduction to Cryptography"
User Rating for material titled "Introduction to Cryptography"
Member Comments for material titled "Introduction to Cryptography"
Bookmark Collections for material titled "Introduction to Cryptography"
Course ePortfolios for material titled "Introduction to Cryptography"
Learning Exercises for material titled "Introduction to Cryptography"
Accessibility Info for material titled "Introduction to Cryptography"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 5 average rating
User Rating 5 user rating
Discussion (1 Comment)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Accountability and Deterrence in Online Life

This video was recorded at 3rd International Conference on Web Science. The standard technical approach to privacy and... see more
Material Type: Presentation
Author: Joan Feigenbaum
Date Added: Feb 08, 2015 Date Modified: Feb 08, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Accountability and Deterrence in Online Life"
User Rating for material titled "Accountability and Deterrence in Online Life"
Member Comments for material titled "Accountability and Deterrence in Online Life"
Bookmark Collections for material titled "Accountability and Deterrence in Online Life"
Course ePortfolios for material titled "Accountability and Deterrence in Online Life"
Learning Exercises for material titled "Accountability and Deterrence in Online Life"
Accessibility Info for material titled "Accountability and Deterrence in Online Life"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Advanced Topics in Mathematics

A high school math page that explores, fractals, knots, encryption, barcodes, number theory, and chaos theory.
Material Type: Tutorial
Author: Anthony Beckwith
Date Added: Mar 14, 2005 Date Modified: Mar 14, 2005
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Advanced Topics in Mathematics"
User Rating for material titled "Advanced Topics in Mathematics"
Member Comments for material titled "Advanced Topics in Mathematics"
Bookmark Collections for material titled "Advanced Topics in Mathematics"
Course ePortfolios for material titled "Advanced Topics in Mathematics"
Learning Exercises for material titled "Advanced Topics in Mathematics"
Accessibility Info for material titled "Advanced Topics in Mathematics"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

CIA's Kryptos Sculpture

This site provides a photo of the enigmatic Kryptos Sculpture at the CIA Headquarters in Washington, D.C., as well as a link... see more
Material Type: Presentation
Author: U.S. Central Intelligence Agency
Date Added: Aug 25, 2005 Date Modified: Aug 25, 2005
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "CIA's Kryptos Sculpture"
User Rating for material titled "CIA's Kryptos Sculpture"
Member Comments for material titled "CIA's Kryptos Sculpture"
Bookmark Collections for material titled "CIA's Kryptos Sculpture"
Course ePortfolios for material titled "CIA's Kryptos Sculpture"
Learning Exercises for material titled "CIA's Kryptos Sculpture"
Accessibility Info for material titled "CIA's Kryptos Sculpture"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Cryptography

This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher... see more
Material Type: Online Course
Author: The Saylor Foundation
Date Added: Jan 27, 2012 Date Modified: Jan 27, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Cryptography"
User Rating for material titled "Cryptography"
Member Comments for material titled "Cryptography"
Bookmark Collections for material titled "Cryptography"
Course ePortfolios for material titled "Cryptography"
Learning Exercises for material titled "Cryptography"
Accessibility Info for material titled "Cryptography"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Cryptology FAQ's

RSA Laboratories' Frequently Asked Questions About Today's Cryptography is an extensive collection of questions about modern... see more
Material Type: Presentation
Author: RSA Laboratories
Date Added: Mar 13, 2005 Date Modified: Feb 24, 2009
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Cryptology FAQ's"
User Rating for material titled "Cryptology FAQ's"
Member Comments for material titled "Cryptology FAQ's"
Bookmark Collections for material titled "Cryptology FAQ's"
Course ePortfolios for material titled "Cryptology FAQ's"
Learning Exercises for material titled "Cryptology FAQ's"
Accessibility Info for material titled "Cryptology FAQ's"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Detection of server side web attacks

This video was recorded at Workshop on Applications of Pattern Analysis (WAPA), Cumberland Lodge 2010. Pattern Analysis and... see more
Material Type: Presentation
Author: Igino Corona
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Detection of server side web attacks"
User Rating for material titled "Detection of server side web attacks"
Member Comments for material titled "Detection of server side web attacks"
Bookmark Collections for material titled "Detection of server side web attacks"
Course ePortfolios for material titled "Detection of server side web attacks"
Learning Exercises for material titled "Detection of server side web attacks"
Accessibility Info for material titled "Detection of server side web attacks"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Fifty ways to detect a ghostwriter

This video was recorded at Slovenian KDD Conference on Data Mining and Data Warehouses (SiKDD), Ljubljana 2011. Ghostwriting... see more
Material Type: Presentation
Author: Katerina Zdravkova
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Fifty ways to detect a ghostwriter"
User Rating for material titled "Fifty ways to detect a ghostwriter"
Member Comments for material titled "Fifty ways to detect a ghostwriter"
Bookmark Collections for material titled "Fifty ways to detect a ghostwriter"
Course ePortfolios for material titled "Fifty ways to detect a ghostwriter"
Learning Exercises for material titled "Fifty ways to detect a ghostwriter"
Accessibility Info for material titled "Fifty ways to detect a ghostwriter"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 1 of 2
2  Next Next Arrow
Jump to page