Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

 
Materials 1 - 10 shown of 13 results

Introduction to Cryptography

This site provides a brief textual overview of the field of cryptography and related issues including popular techniques,... see more
Material Type: Presentation
Author: RSA Laboratories
Date Added: Aug 25, 2005 Date Modified: Jan 15, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Introduction to Cryptography"
User Rating for material titled "Introduction to Cryptography"
Member Comments for material titled "Introduction to Cryptography"
Bookmark Collections for material titled "Introduction to Cryptography"
Course ePortfolios for material titled "Introduction to Cryptography"
Learning Exercises for material titled "Introduction to Cryptography"
Accessibility Info for material titled "Introduction to Cryptography"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 5 average rating
User Rating 5 user rating
Discussion (1 Comment)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Accountability and Deterrence in Online Life

This video was recorded at 3rd International Conference on Web Science. The standard technical approach to privacy and... see more
Material Type: Presentation
Author: Joan Feigenbaum
Date Added: Feb 08, 2015 Date Modified: Feb 08, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Accountability and Deterrence in Online Life"
User Rating for material titled "Accountability and Deterrence in Online Life"
Member Comments for material titled "Accountability and Deterrence in Online Life"
Bookmark Collections for material titled "Accountability and Deterrence in Online Life"
Course ePortfolios for material titled "Accountability and Deterrence in Online Life"
Learning Exercises for material titled "Accountability and Deterrence in Online Life"
Accessibility Info for material titled "Accountability and Deterrence in Online Life"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

CIA's Kryptos Sculpture

This site provides a photo of the enigmatic Kryptos Sculpture at the CIA Headquarters in Washington, D.C., as well as a link... see more
Material Type: Presentation
Author: U.S. Central Intelligence Agency
Date Added: Aug 25, 2005 Date Modified: Aug 25, 2005
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "CIA's Kryptos Sculpture"
User Rating for material titled "CIA's Kryptos Sculpture"
Member Comments for material titled "CIA's Kryptos Sculpture"
Bookmark Collections for material titled "CIA's Kryptos Sculpture"
Course ePortfolios for material titled "CIA's Kryptos Sculpture"
Learning Exercises for material titled "CIA's Kryptos Sculpture"
Accessibility Info for material titled "CIA's Kryptos Sculpture"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Cryptology FAQ's

RSA Laboratories' Frequently Asked Questions About Today's Cryptography is an extensive collection of questions about modern... see more
Material Type: Presentation
Author: RSA Laboratories
Date Added: Mar 13, 2005 Date Modified: Feb 24, 2009
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Cryptology FAQ's"
User Rating for material titled "Cryptology FAQ's"
Member Comments for material titled "Cryptology FAQ's"
Bookmark Collections for material titled "Cryptology FAQ's"
Course ePortfolios for material titled "Cryptology FAQ's"
Learning Exercises for material titled "Cryptology FAQ's"
Accessibility Info for material titled "Cryptology FAQ's"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Detection of server side web attacks

This video was recorded at Workshop on Applications of Pattern Analysis (WAPA), Cumberland Lodge 2010. Pattern Analysis and... see more
Material Type: Presentation
Author: Igino Corona
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Detection of server side web attacks"
User Rating for material titled "Detection of server side web attacks"
Member Comments for material titled "Detection of server side web attacks"
Bookmark Collections for material titled "Detection of server side web attacks"
Course ePortfolios for material titled "Detection of server side web attacks"
Learning Exercises for material titled "Detection of server side web attacks"
Accessibility Info for material titled "Detection of server side web attacks"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Fifty ways to detect a ghostwriter

This video was recorded at Slovenian KDD Conference on Data Mining and Data Warehouses (SiKDD), Ljubljana 2011. Ghostwriting... see more
Material Type: Presentation
Author: Katerina Zdravkova
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Fifty ways to detect a ghostwriter"
User Rating for material titled "Fifty ways to detect a ghostwriter"
Member Comments for material titled "Fifty ways to detect a ghostwriter"
Bookmark Collections for material titled "Fifty ways to detect a ghostwriter"
Course ePortfolios for material titled "Fifty ways to detect a ghostwriter"
Learning Exercises for material titled "Fifty ways to detect a ghostwriter"
Accessibility Info for material titled "Fifty ways to detect a ghostwriter"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

IMDS: Intelligent Malware Detection System

This video was recorded at 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), San Jose... see more
Material Type: Presentation
Author: Yanfang Ye
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "IMDS: Intelligent Malware Detection System"
User Rating for material titled "IMDS: Intelligent Malware Detection System"
Member Comments for material titled "IMDS: Intelligent Malware Detection System"
Bookmark Collections for material titled "IMDS: Intelligent Malware Detection System"
Course ePortfolios for material titled "IMDS: Intelligent Malware Detection System"
Learning Exercises for material titled "IMDS: Intelligent Malware Detection System"
Accessibility Info for material titled "IMDS: Intelligent Malware Detection System"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Parametric Autentication. How I know who you are?

This video was recorded at VideoLectures.NET - Single Lectures Series. The Single Lectures Series is an attempt of the... see more
Material Type: Presentation
Author: Anil K. Jain
Date Added: Feb 08, 2015 Date Modified: Feb 08, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Parametric Autentication. How I know who you are?"
User Rating for material titled "Parametric Autentication. How I know who you are?"
Member Comments for material titled "Parametric Autentication. How I know who you are?"
Bookmark Collections for material titled "Parametric Autentication. How I know who you are?"
Course ePortfolios for material titled "Parametric Autentication. How I know who you are?"
Learning Exercises for material titled "Parametric Autentication. How I know who you are?"
Accessibility Info for material titled "Parametric Autentication. How I know who you are?"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Plastic Card Fraud Detection using Peer Group Analysis

This video was recorded at NATO Advanced Study Institute on Mining Massive Data Sets for Security. Fraud detection... see more
Material Type: Presentation
Author: Dave Weston
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
User Rating for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Member Comments for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Bookmark Collections for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Course ePortfolios for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Learning Exercises for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
Accessibility Info for material titled "Plastic Card Fraud Detection using Peer Group Analysis"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)

This video was recorded at Solomon seminar. Solomon seminar is a series of open public seminars mainly on Artificial... see more
Material Type: Presentation
Author: David Chadwick
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
User Rating for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Member Comments for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Bookmark Collections for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Course ePortfolios for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Learning Exercises for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
Accessibility Info for material titled "Privilege Management using X.509 Attribute Certificates (upravljanje z digitalnimi pooblastili)"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 1 of 2
2  Next Next Arrow
Jump to page