Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

 
Materials 31 - 40 shown of 45 results

Information Security (06:05): Network Security

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:05): Network Security"
User Rating for material titled "Information Security (06:05): Network Security"
Member Comments for material titled "Information Security (06:05): Network Security"
Bookmark Collections for material titled "Information Security (06:05): Network Security"
Course ePortfolios for material titled "Information Security (06:05): Network Security"
Learning Exercises for material titled "Information Security (06:05): Network Security"
Accessibility Info for material titled "Information Security (06:05): Network Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:06): Internet Security

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:06): Internet Security"
User Rating for material titled "Information Security (06:06): Internet Security"
Member Comments for material titled "Information Security (06:06): Internet Security"
Bookmark Collections for material titled "Information Security (06:06): Internet Security"
Course ePortfolios for material titled "Information Security (06:06): Internet Security"
Learning Exercises for material titled "Information Security (06:06): Internet Security"
Accessibility Info for material titled "Information Security (06:06): Internet Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:07): Malware

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:07): Malware"
User Rating for material titled "Information Security (06:07): Malware"
Member Comments for material titled "Information Security (06:07): Malware"
Bookmark Collections for material titled "Information Security (06:07): Malware"
Course ePortfolios for material titled "Information Security (06:07): Malware"
Learning Exercises for material titled "Information Security (06:07): Malware"
Accessibility Info for material titled "Information Security (06:07): Malware"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:08): Social Engineering

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at:... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Sep 21, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:08): Social Engineering"
User Rating for material titled "Information Security (06:08): Social Engineering"
Member Comments for material titled "Information Security (06:08): Social Engineering"
Bookmark Collections for material titled "Information Security (06:08): Social Engineering"
Course ePortfolios for material titled "Information Security (06:08): Social Engineering"
Learning Exercises for material titled "Information Security (06:08): Social Engineering"
Accessibility Info for material titled "Information Security (06:08): Social Engineering"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Mytest

This is just a test
Material Type: Assignment
Author: sara sartoli
Date Added: Feb 09, 2014 Date Modified: Feb 09, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Mytest"
User Rating for material titled "Mytest"
Member Comments for material titled "Mytest"
Bookmark Collections for material titled "Mytest"
Course ePortfolios for material titled "Mytest"
Learning Exercises for material titled "Mytest"
Accessibility Info for material titled "Mytest"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (1)
Accessibility Info (none)

Network Monitoring at C-Bay

Students work on network monitoring procedures at C-Bay, an online Real Estate auction company. They recommend intrusion... see more
Material Type: Simulation
Author: Mike Murphy, Catherine Ayers, Tony Nguyen, Sukhjit Singh
Date Added: Jun 22, 2007 Date Modified: Aug 13, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Network Monitoring at C-Bay"
User Rating for material titled "Network Monitoring at C-Bay"
Member Comments for material titled "Network Monitoring at C-Bay"
Bookmark Collections for material titled "Network Monitoring at C-Bay"
Course ePortfolios for material titled "Network Monitoring at C-Bay"
Learning Exercises for material titled "Network Monitoring at C-Bay"
Accessibility Info for material titled "Network Monitoring at C-Bay"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Nework Security

״Encryption of files and firewalls are just some of the security measures that can be used in security. This unit, which... see more
Material Type: Open Textbook
Author: The Open University
Date Added: Jan 18, 2011 Date Modified: Jan 18, 2011
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Nework Security"
User Rating for material titled "Nework Security"
Member Comments for material titled "Nework Security"
Bookmark Collections for material titled "Nework Security"
Course ePortfolios for material titled "Nework Security"
Learning Exercises for material titled "Nework Security"
Accessibility Info for material titled "Nework Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Policing Cyber Crime

This is a free, online textbook offered by Bookboon.com.  Topics include:1. Cyber Crime Defined,2. Cyber Crime Cases,3. Child... see more
Material Type: Open Textbook
Author: Peter Gottschalk
Date Added: Jan 12, 2011 Date Modified: Jan 12, 2011
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Policing Cyber Crime"
User Rating for material titled "Policing Cyber Crime"
Member Comments for material titled "Policing Cyber Crime"
Bookmark Collections for material titled "Policing Cyber Crime"
Course ePortfolios for material titled "Policing Cyber Crime"
Learning Exercises for material titled "Policing Cyber Crime"
Accessibility Info for material titled "Policing Cyber Crime"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

proxy squid básico

Primero hay que destacar que con squid podemos hacer un proxy de cache y/o de filtrado, la ventaja que tiene hacer un proxy... see more
Material Type: Tutorial
Author: Roy Alvear, Roy Alvear
Date Added: May 26, 2012 Date Modified: Jul 05, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "proxy squid básico"
User Rating for material titled "proxy squid básico"
Member Comments for material titled "proxy squid básico"
Bookmark Collections for material titled "proxy squid básico"
Course ePortfolios for material titled "proxy squid básico"
Learning Exercises for material titled "proxy squid básico"
Accessibility Info for material titled "proxy squid básico"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Risk Analysis in Software Design

Risk analysis is often viewed as a “black art”—part fortune telling, part mathematics. Successful risk analysis, however, is... see more
Material Type: Presentation
Author: Gary McGraw
Date Added: Nov 16, 2005 Date Modified: Nov 16, 2005
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Risk Analysis in Software Design"
User Rating for material titled "Risk Analysis in Software Design"
Member Comments for material titled "Risk Analysis in Software Design"
Bookmark Collections for material titled "Risk Analysis in Software Design"
Course ePortfolios for material titled "Risk Analysis in Software Design"
Learning Exercises for material titled "Risk Analysis in Software Design"
Accessibility Info for material titled "Risk Analysis in Software Design"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 4 of 5
Left Arrow  Prev 1  2  3  4  5  Next Next Arrow
Jump to page