Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
View material results for all categories
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

Materials 1 - 8 shown of 8 results

Encryption

A video discussion of encryption over the Internet for beginners
Material Type: Presentation
Author: Corinne Hoisington
Date Added: Mar 30, 2005 Date Modified: Oct 25, 2012
Peer Review for material titled "Encryption"
User Rating for material titled "Encryption"
Member Comments for material titled "Encryption"
Learning Exercises for material titled "Encryption"
Personal Collections for material titled "Encryption"
Accessibility Info for material titled "Encryption"
About this material:
Peer Reviews 5 rating
User Rating 2 user rating
Discussion (1 Comment)
Personal Collections (5)
Learning Exercises (none)
Accessibility Info (none)

US-CERT Cyber Security Tips

the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more
Material Type: Presentation
Author: United States Computer Emergency Readiness Team
Date Added: Apr 27, 2005 Date Modified: Feb 05, 2014
Peer Review for material titled "US-CERT Cyber Security Tips"
User Rating for material titled "US-CERT Cyber Security Tips"
Member Comments for material titled "US-CERT Cyber Security Tips"
Learning Exercises for material titled "US-CERT Cyber Security Tips"
Personal Collections for material titled "US-CERT Cyber Security Tips"
Accessibility Info for material titled "US-CERT Cyber Security Tips"
About this material:
Peer Reviews 5 rating
User Rating 4 user rating
Discussion (1 Comment)
Personal Collections (5)
Learning Exercises (none)
Accessibility Info (none)

An Overview of Steganography for the Computer Forensics Examiner

Created as a training tool for computer forensics technicians, this website provides an abundance of information on the art... see more
Material Type: Presentation
Author: Gary Kessler
Date Added: Dec 01, 2007 Date Modified: Feb 17, 2012
Peer Review for material titled "An Overview of Steganography for the Computer Forensics Examiner"
User Rating for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Member Comments for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Learning Exercises for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Personal Collections for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Accessibility Info for material titled "An Overview of Steganography for the Computer Forensics Examiner"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)

Information Security Principles: An Overview

These preview video clips feature authoritative experts in information security and assurance. The complete video and the... see more
Material Type: Presentation
Author: Matt Rose
Date Added: Jan 16, 2003 Date Modified: Jan 15, 2014
Peer Review for material titled "Information Security Principles: An Overview"
User Rating for material titled "Information Security Principles: An Overview"
Member Comments for material titled "Information Security Principles: An Overview"
Learning Exercises for material titled "Information Security Principles: An Overview"
Personal Collections for material titled "Information Security Principles: An Overview"
Accessibility Info for material titled "Information Security Principles: An Overview"
About this material:
Editor Review avg: 4 rating
User Rating (not rated)
Discussion (none)
Personal Collections (4)
Learning Exercises (none)
Accessibility Info (none)

1SP Ozel Guvenlik Sirketleri Istanbul

ISP Private Security and Protection, Istanbul, Turkey. There is a lot of info about security sector, and industry. You can... see more
Material Type: Presentation
Author: Ozel Guvenlik
Date Added: Aug 19, 2013 Date Modified: Mar 28, 2014
Peer Review for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
User Rating for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Member Comments for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Learning Exercises for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Personal Collections for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Accessibility Info for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
About this material:
Editor Review avg: 4 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

How your network can be scanned

PowerPoint showing how a network is scanned and information is gathered about target computers
Material Type: Presentation
Author: Steve Mallard
Date Added: Jul 07, 2012 Date Modified: Jul 07, 2012
Peer Review for material titled "How your network can be scanned"
User Rating for material titled "How your network can be scanned"
Member Comments for material titled "How your network can be scanned"
Learning Exercises for material titled "How your network can be scanned"
Personal Collections for material titled "How your network can be scanned"
Accessibility Info for material titled "How your network can be scanned"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Risk Analysis in Software Design

Risk analysis is often viewed as a “black art”—part fortune telling, part mathematics. Successful risk analysis, however, is... see more
Material Type: Presentation
Author: Gary McGraw
Date Added: Nov 16, 2005 Date Modified: Nov 16, 2005
Peer Review for material titled "Risk Analysis in Software Design"
User Rating for material titled "Risk Analysis in Software Design"
Member Comments for material titled "Risk Analysis in Software Design"
Learning Exercises for material titled "Risk Analysis in Software Design"
Personal Collections for material titled "Risk Analysis in Software Design"
Accessibility Info for material titled "Risk Analysis in Software Design"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

What Every Web Programmer Needs To Know About Security

'This submission contains slides that complement each of the chapters in the book "Foundations of Security: What Every... see more
Material Type: Presentation
Author: Arkajit Dey, Neil Daswani
Date Added: Jan 18, 2011 Date Modified: Aug 11, 2014
Peer Review for material titled "What Every Web Programmer Needs To Know About Security"
User Rating for material titled "What Every Web Programmer Needs To Know About Security"
Member Comments for material titled "What Every Web Programmer Needs To Know About Security"
Learning Exercises for material titled "What Every Web Programmer Needs To Know About Security"
Personal Collections for material titled "What Every Web Programmer Needs To Know About Security"
Accessibility Info for material titled "What Every Web Programmer Needs To Know About Security"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)
RSS Feed

Results page 1 of 1
Jump to page