Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
View material results for all categories
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II






        

Refine Your Search:

Materials 31 - 39 shown of 39 results

Nework Security

״Encryption of files and firewalls are just some of the security measures that can be used in security. This unit, which... see more
Material Type: Open Textbook
Author: The Open University
Date Added: Jan 18, 2011 Date Modified: Jan 18, 2011
Peer Review for material titled "Nework Security"
User Rating for material titled "Nework Security"
Member Comments for material titled "Nework Security"
Learning Exercises for material titled "Nework Security"
Personal Collections for material titled "Nework Security"
Accessibility Info for material titled "Nework Security"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

OVANET

Objeto Virtual de Aprendizaje acerca de, Mecanismos de Protección para redes de comunicación.Este OVA profundiza en temas... see more
Material Type: Learning Object Repository
Author: Miguel Eduardo Guerrero Ibarra, Magister Luis Carlos Revelo Tovar (Director Proyecto de Grado)
Date Added: Sep 29, 2010 Date Modified: Aug 15, 2012
Peer Review for material titled "OVANET"
User Rating for material titled "OVANET"
Member Comments for material titled "OVANET"
Learning Exercises for material titled "OVANET"
Personal Collections for material titled "OVANET"
Accessibility Info for material titled "OVANET"
About this material:
Editor Review avg: 4 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Policing Cyber Crime

This is a free, online textbook offered by Bookboon.com.  Topics include:1. Cyber Crime Defined,2. Cyber Crime Cases,3. Child... see more
Material Type: Open Textbook
Author: Peter Gottschalk
Date Added: Jan 12, 2011 Date Modified: Jan 12, 2011
Peer Review for material titled "Policing Cyber Crime"
User Rating for material titled "Policing Cyber Crime"
Member Comments for material titled "Policing Cyber Crime"
Learning Exercises for material titled "Policing Cyber Crime"
Personal Collections for material titled "Policing Cyber Crime"
Accessibility Info for material titled "Policing Cyber Crime"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

proxy squid básico

Primero hay que destacar que con squid podemos hacer un proxy de cache y/o de filtrado, la ventaja que tiene hacer un proxy... see more
Material Type: Tutorial
Author: Roy Alvear, Roy Alvear
Date Added: May 26, 2012 Date Modified: Jul 05, 2012
Peer Review for material titled "proxy squid básico"
User Rating for material titled "proxy squid básico"
Member Comments for material titled "proxy squid básico"
Learning Exercises for material titled "proxy squid básico"
Personal Collections for material titled "proxy squid básico"
Accessibility Info for material titled "proxy squid básico"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Risk Analysis in Software Design

Risk analysis is often viewed as a “black art”—part fortune telling, part mathematics. Successful risk analysis, however, is... see more
Material Type: Presentation
Author: Gary McGraw
Date Added: Nov 16, 2005 Date Modified: Nov 16, 2005
Peer Review for material titled "Risk Analysis in Software Design"
User Rating for material titled "Risk Analysis in Software Design"
Member Comments for material titled "Risk Analysis in Software Design"
Learning Exercises for material titled "Risk Analysis in Software Design"
Personal Collections for material titled "Risk Analysis in Software Design"
Accessibility Info for material titled "Risk Analysis in Software Design"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

The Dark Visitor: Inside the World of Chinese Hackers

״This book attempts to analyze the history, ideology, organization, exploits, and political motivations of the Chinese hacker... see more
Material Type: Open Textbook
Author: Scott J. Henderson
Date Added: Jun 29, 2011 Date Modified: Jun 29, 2011
Peer Review for material titled "The Dark Visitor: Inside the World of Chinese Hackers"
User Rating for material titled "The Dark Visitor: Inside the World of Chinese Hackers"
Member Comments for material titled "The Dark Visitor: Inside the World of Chinese Hackers"
Learning Exercises for material titled "The Dark Visitor: Inside the World of Chinese Hackers"
Personal Collections for material titled "The Dark Visitor: Inside the World of Chinese Hackers"
Accessibility Info for material titled "The Dark Visitor: Inside the World of Chinese Hackers"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

The Hacker Crackdown

״Bruce Sterling's classic work highlights the 1990 assault on hackers, when law-enforcement officials successfully arrested... see more
Material Type: Open Textbook
Author: Bruce Sterling
Date Added: Jun 29, 2011 Date Modified: Jun 29, 2011
Peer Review for material titled "The Hacker Crackdown"
User Rating for material titled "The Hacker Crackdown"
Member Comments for material titled "The Hacker Crackdown"
Learning Exercises for material titled "The Hacker Crackdown"
Personal Collections for material titled "The Hacker Crackdown"
Accessibility Info for material titled "The Hacker Crackdown"
About this material:
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

We've Been Hacked!

The security team at C-Bay, an online Real Estate auction company, analyze and respond to an increase in hacking... see more
Material Type: Simulation
Author: Sukhjit Singh, David Gillett, Mike Murphy, Catherine Ayers
Date Added: Jun 22, 2007 Date Modified: Aug 13, 2012
Peer Review for material titled "We've Been Hacked!"
User Rating for material titled "We've Been Hacked!"
Member Comments for material titled "We've Been Hacked!"
Learning Exercises for material titled "We've Been Hacked!"
Personal Collections for material titled "We've Been Hacked!"
Accessibility Info for material titled "We've Been Hacked!"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

What Every Web Programmer Needs To Know About Security

'This submission contains slides that complement each of the chapters in the book "Foundations of Security: What Every... see more
Material Type: Presentation
Author: Arkajit Dey, Neil Daswani
Date Added: Jan 18, 2011 Date Modified: Aug 11, 2014
Peer Review for material titled "What Every Web Programmer Needs To Know About Security"
User Rating for material titled "What Every Web Programmer Needs To Know About Security"
Member Comments for material titled "What Every Web Programmer Needs To Know About Security"
Learning Exercises for material titled "What Every Web Programmer Needs To Know About Security"
Personal Collections for material titled "What Every Web Programmer Needs To Know About Security"
Accessibility Info for material titled "What Every Web Programmer Needs To Know About Security"
About this material:
Editor Review avg: 5 rating
User Rating (not rated)
Discussion (none)
Personal Collections (none)
Learning Exercises (none)
Accessibility Info (none)

Results page 4 of 4
Left Arrow  Prev 1  2  3  4 
Jump to page