Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

Materials 21 - 30 shown of 39 results

Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)

An ideology is defined as a set of ideas that “explains and evaluates social conditions, helps people understand their place... see more
Material Type: Reference Material
Author: Shalin Hai-Jew
Date Added: Mar 20, 2013 Date Modified: Sep 15, 2013
Peer Review for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
User Rating for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Member Comments for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Personal Collections for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Learning Exercises for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Accessibility Info for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Copyright

This is an introduction of what copyrighting materials should be or are.  It provides video and an assessment of the subject... see more
Material Type: Tutorial
Author: Edwina Lawson
Date Added: Feb 13, 2012 Date Modified: Jul 09, 2012
Peer Review for material titled "Copyright"
User Rating for material titled "Copyright"
Member Comments for material titled "Copyright"
Personal Collections for material titled "Copyright"
Learning Exercises for material titled "Copyright"
Accessibility Info for material titled "Copyright"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Data Security

Basic tips for protecting electronic data at work.
Material Type: Tutorial
Author: Cory Lammers
Date Added: Apr 26, 2012 Date Modified: May 02, 2012
Peer Review for material titled "Data Security"
User Rating for material titled "Data Security"
Member Comments for material titled "Data Security"
Personal Collections for material titled "Data Security"
Learning Exercises for material titled "Data Security"
Accessibility Info for material titled "Data Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 5 average rating
User Rating 5 user rating
Discussion (2 Comments)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

DNS con Bind9 en CentOS

Instalación básica de un DNS con bind9 en modo seguro con chroot
Material Type: Tutorial
Author: Roy Alvear, Mauricio Vasquez
Date Added: May 26, 2012 Date Modified: Jun 29, 2012
Peer Review for material titled "DNS con Bind9 en CentOS"
User Rating for material titled "DNS con Bind9 en CentOS"
Member Comments for material titled "DNS con Bind9 en CentOS"
Personal Collections for material titled "DNS con Bind9 en CentOS"
Learning Exercises for material titled "DNS con Bind9 en CentOS"
Accessibility Info for material titled "DNS con Bind9 en CentOS"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Fundamentals of Media Security

This is a free textbook offered by BookBoon.'This introductory text covers media security, starting off by highlighting... see more
Material Type: Open Textbook
Author: WeiQi Yan, Jonathan Weir
Date Added: Feb 25, 2014 Date Modified: Feb 25, 2014
Peer Review for material titled "Fundamentals of Media Security"
User Rating for material titled "Fundamentals of Media Security"
Member Comments for material titled "Fundamentals of Media Security"
Personal Collections for material titled "Fundamentals of Media Security"
Learning Exercises for material titled "Fundamentals of Media Security"
Accessibility Info for material titled "Fundamentals of Media Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Good Digital Hygiene A guide to staying secure in cyberspace

This is a free textbook offered by BookBoon.'Many people now understand the role of personal hygiene in maintaining good... see more
Material Type: Open Textbook
Author: Eduardo Gelbstein
Date Added: Feb 05, 2014 Date Modified: Feb 05, 2014
Peer Review for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
User Rating for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Member Comments for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Personal Collections for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Learning Exercises for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Accessibility Info for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Health and Wellness for Your Computer

This resource was named the Best Graduate (Professional Studies/Training) Lesson in the 2009 SoftChalk Lesson... see more
Material Type: Tutorial
Author: Suzanne McGinnis, Elizabeth Miles
Date Added: May 08, 2014 Date Modified: May 08, 2014
Peer Review for material titled "Health and Wellness for Your Computer"
User Rating for material titled "Health and Wellness for Your Computer"
Member Comments for material titled "Health and Wellness for Your Computer"
Personal Collections for material titled "Health and Wellness for Your Computer"
Learning Exercises for material titled "Health and Wellness for Your Computer"
Accessibility Info for material titled "Health and Wellness for Your Computer"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

How your network can be scanned

PowerPoint showing how a network is scanned and information is gathered about target computers
Material Type: Presentation
Author: Steve Mallard
Date Added: Jul 07, 2012 Date Modified: Jul 07, 2012
Peer Review for material titled "How your network can be scanned"
User Rating for material titled "How your network can be scanned"
Member Comments for material titled "How your network can be scanned"
Personal Collections for material titled "How your network can be scanned"
Learning Exercises for material titled "How your network can be scanned"
Accessibility Info for material titled "How your network can be scanned"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security

This course focuses on the fundamentals of information security -- protection of the information present in computer storage... see more
Material Type: Online Course
Author: The Saylor Foundation
Date Added: Jan 27, 2012 Date Modified: Jan 27, 2012
Peer Review for material titled "Information Security"
User Rating for material titled "Information Security"
Member Comments for material titled "Information Security"
Personal Collections for material titled "Information Security"
Learning Exercises for material titled "Information Security"
Accessibility Info for material titled "Information Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Network Monitoring at C-Bay

Students work on network monitoring procedures at C-Bay, an online Real Estate auction company. They recommend intrusion... see more
Material Type: Simulation
Author: Mike Murphy, Catherine Ayers, Tony Nguyen, Sukhjit Singh
Date Added: Jun 22, 2007 Date Modified: Aug 13, 2012
Peer Review for material titled "Network Monitoring at C-Bay"
User Rating for material titled "Network Monitoring at C-Bay"
Member Comments for material titled "Network Monitoring at C-Bay"
Personal Collections for material titled "Network Monitoring at C-Bay"
Learning Exercises for material titled "Network Monitoring at C-Bay"
Accessibility Info for material titled "Network Monitoring at C-Bay"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 3 of 4
Left Arrow  Prev 1  2  3  4  Next Next Arrow
Jump to page