Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
View material results for all categories
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

Materials 1 - 10 shown of 40 results

Computer Knowledge Virus Tutorial

This is a tutorial on computer viruses. It discusses what computer viruses are, gives some history, and discusses protection... see more
Material Type: Tutorial
Author: Computer Knowledge
Date Added: Mar 24, 2001 Date Modified: Apr 18, 2014
Peer Review for material titled "Computer Knowledge Virus Tutorial"
User Rating for material titled "Computer Knowledge Virus Tutorial"
Member Comments for material titled "Computer Knowledge Virus Tutorial"
Learning Exercises for material titled "Computer Knowledge Virus Tutorial"
Personal Collections for material titled "Computer Knowledge Virus Tutorial"
Accessibility Info for material titled "Computer Knowledge Virus Tutorial"
About this material:
Peer Reviews 5 rating
User Rating 4 user rating
Discussion (13 Comments)
Personal Collections (15)
Learning Exercises (none)
Accessibility Info (none)

Information Security Management Concepts

This demonstration module provides an overview of the key concepts and goals of information security and how information... see more
Material Type: Collection
Author: Matt Rose
Date Added: Jan 16, 2003 Date Modified: Oct 07, 2011
Peer Review for material titled "Information Security Management Concepts"
User Rating for material titled "Information Security Management Concepts"
Member Comments for material titled "Information Security Management Concepts"
Learning Exercises for material titled "Information Security Management Concepts"
Personal Collections for material titled "Information Security Management Concepts"
Accessibility Info for material titled "Information Security Management Concepts"
About this material:
Peer Reviews 4.27 rating
User Rating (not rated)
Discussion (none)
Personal Collections (17)
Learning Exercises (none)
Accessibility Info (none)

An Overview of Cryptography

A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES, Diffie-Hellman, and... see more
Material Type: Tutorial
Author: Gary Kessler
Date Added: Dec 30, 2002 Date Modified: Oct 04, 2010
Peer Review for material titled "An Overview of Cryptography"
User Rating for material titled "An Overview of Cryptography"
Member Comments for material titled "An Overview of Cryptography"
Learning Exercises for material titled "An Overview of Cryptography"
Personal Collections for material titled "An Overview of Cryptography"
Accessibility Info for material titled "An Overview of Cryptography"
About this material:
Peer Reviews 5 rating
User Rating 4 user rating
Discussion (1 Comment)
Personal Collections (7)
Learning Exercises (none)
Accessibility Info (none)

Encryption

A video discussion of encryption over the Internet for beginners
Material Type: Presentation
Author: Corinne Hoisington
Date Added: Mar 30, 2005 Date Modified: Oct 25, 2012
Peer Review for material titled "Encryption"
User Rating for material titled "Encryption"
Member Comments for material titled "Encryption"
Learning Exercises for material titled "Encryption"
Personal Collections for material titled "Encryption"
Accessibility Info for material titled "Encryption"
About this material:
Peer Reviews 5 rating
User Rating 2 user rating
Discussion (1 Comment)
Personal Collections (5)
Learning Exercises (none)
Accessibility Info (none)

US-CERT Cyber Security Tips

the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more
Material Type: Presentation
Author: United States Computer Emergency Readiness Team
Date Added: Apr 27, 2005 Date Modified: Feb 05, 2014
Peer Review for material titled "US-CERT Cyber Security Tips"
User Rating for material titled "US-CERT Cyber Security Tips"
Member Comments for material titled "US-CERT Cyber Security Tips"
Learning Exercises for material titled "US-CERT Cyber Security Tips"
Personal Collections for material titled "US-CERT Cyber Security Tips"
Accessibility Info for material titled "US-CERT Cyber Security Tips"
About this material:
Peer Reviews 5 rating
User Rating 4 user rating
Discussion (1 Comment)
Personal Collections (5)
Learning Exercises (none)
Accessibility Info (none)

An Overview of Steganography for the Computer Forensics Examiner

Created as a training tool for computer forensics technicians, this website provides an abundance of information on the art... see more
Material Type: Presentation
Author: Gary Kessler
Date Added: Dec 01, 2007 Date Modified: Feb 17, 2012
Peer Review for material titled "An Overview of Steganography for the Computer Forensics Examiner"
User Rating for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Member Comments for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Learning Exercises for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Personal Collections for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Accessibility Info for material titled "An Overview of Steganography for the Computer Forensics Examiner"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)

Anti-Phishing Phil

Anti-Phishing Phil is an interactive game that teaches users how to identify phishing URLs, where to look for cues in web... see more
Material Type: Tutorial
Author: Carnegie Mellon University
Date Added: Sep 26, 2007 Date Modified: May 18, 2010
Peer Review for material titled "Anti-Phishing Phil"
User Rating for material titled "Anti-Phishing Phil"
Member Comments for material titled "Anti-Phishing Phil"
Learning Exercises for material titled "Anti-Phishing Phil"
Personal Collections for material titled "Anti-Phishing Phil"
Accessibility Info for material titled "Anti-Phishing Phil"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

This is a free, online textbook.  ״Wherever you go‚ whatever you say, write, photograph, or buy‚ whatever prescriptions you... see more
Material Type: Open Textbook
Author: Ken Ledeen, Harry Lewis, Hal Abelson
Date Added: Feb 23, 2010 Date Modified: Jul 21, 2012
Peer Review for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
User Rating for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Member Comments for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Learning Exercises for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Personal Collections for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Accessibility Info for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
About this material:
Editor Review avg: 4 rating
User Rating 5 user rating
Discussion (1 Comment)
Personal Collections (4)
Learning Exercises (none)
Accessibility Info (1)

C-Bay's Emergency Response

Students analyze C-Bay’s threats and vunlnerabilities, as well as draft emergency response procedures.  Task 6 of... see more
Material Type: Simulation
Author: Paraminder Talwar, Sukhjit Singh, Catherine Ayers, Mike Murphy
Date Added: Jun 25, 2007 Date Modified: Jan 15, 2014
Peer Review for material titled "C-Bay's Emergency Response"
User Rating for material titled "C-Bay's Emergency Response"
Member Comments for material titled "C-Bay's Emergency Response"
Learning Exercises for material titled "C-Bay's Emergency Response"
Personal Collections for material titled "C-Bay's Emergency Response"
Accessibility Info for material titled "C-Bay's Emergency Response"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)

C-Bay's Network Outages

Students analyze and suggest solutions to an onslaught of network outages at C-Bay, an online Real Estate Auction start up.A... see more
Material Type: Simulation
Author: Catherine Ayers, Gillett David, Sukhjit Singh, Mike Murphy
Date Added: Jun 22, 2007 Date Modified: Jan 15, 2014
Peer Review for material titled "C-Bay's Network Outages"
User Rating for material titled "C-Bay's Network Outages"
Member Comments for material titled "C-Bay's Network Outages"
Learning Exercises for material titled "C-Bay's Network Outages"
Personal Collections for material titled "C-Bay's Network Outages"
Accessibility Info for material titled "C-Bay's Network Outages"
About this material:
Editor Review avg: 4 rating
User Rating (not rated)
Discussion (none)
Personal Collections (1)
Learning Exercises (none)
Accessibility Info (none)
RSS Feed

Results page 1 of 4
2  3  4  Next Next Arrow
Jump to page