Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all categories
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 1 - 10 shown of 20 results

Principales problemas de seguridad en Redes Industriales

No estamos acostumbrados a pensar en las instalaciones industriales como sensibles a problemas de seguridad o, al menos,de... see more
Material Type: Presentation
Author: Gabriel Diaz
Date Added: May 01, 2016 Date Modified: May 25, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Principales problemas de seguridad en Redes Industriales"
User Rating for material titled "Principales problemas de seguridad en Redes Industriales"
Member Comments for material titled "Principales problemas de seguridad en Redes Industriales"
Bookmark Collections for material titled "Principales problemas de seguridad en Redes Industriales"
Course ePortfolios for material titled "Principales problemas de seguridad en Redes Industriales"
Learning Exercises for material titled "Principales problemas de seguridad en Redes Industriales"
Accessibility Info for material titled "Principales problemas de seguridad en Redes Industriales"
eTextbook Reviews for material titled "Principales problemas de seguridad en Redes Industriales"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 5 average rating
User Rating 5 user rating
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Tecnologías de Cortafuegos

Se presentan las tecnologías básicas mas usuales en cortafuegos (firewalls) desde su base con las redes privadas y públicas... see more
Material Type: Presentation
Author: Manuel Castro
Date Added: May 01, 2016 Date Modified: May 01, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Tecnologías de Cortafuegos"
User Rating for material titled "Tecnologías de Cortafuegos"
Member Comments for material titled "Tecnologías de Cortafuegos"
Bookmark Collections for material titled "Tecnologías de Cortafuegos"
Course ePortfolios for material titled "Tecnologías de Cortafuegos"
Learning Exercises for material titled "Tecnologías de Cortafuegos"
Accessibility Info for material titled "Tecnologías de Cortafuegos"
eTextbook Reviews for material titled "Tecnologías de Cortafuegos"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Introducción a los algoritmos de criptografía simétrica

Introducción a los algoritmos criptográficos simétricos
Material Type: Presentation
Author: Gabriel Diaz
Date Added: May 01, 2016 Date Modified: May 01, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Introducción a los algoritmos de criptografía simétrica"
User Rating for material titled "Introducción a los algoritmos de criptografía simétrica"
Member Comments for material titled "Introducción a los algoritmos de criptografía simétrica"
Bookmark Collections for material titled "Introducción a los algoritmos de criptografía simétrica"
Course ePortfolios for material titled "Introducción a los algoritmos de criptografía simétrica"
Learning Exercises for material titled "Introducción a los algoritmos de criptografía simétrica"
Accessibility Info for material titled "Introducción a los algoritmos de criptografía simétrica"
eTextbook Reviews for material titled "Introducción a los algoritmos de criptografía simétrica"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

¿Qué es la firma digital?

Esta píldora presenta de manera sucinta en qué consiste la firma digital de los mensajes, qué algoritmos y estructuras... see more
Material Type: Presentation
Author: Gabriel Diaz
Date Added: Apr 30, 2016 Date Modified: Apr 30, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "¿Qué es la firma digital?"
User Rating for material titled "¿Qué es la firma digital?"
Member Comments for material titled "¿Qué es la firma digital?"
Bookmark Collections for material titled "¿Qué es la firma digital?"
Course ePortfolios for material titled "¿Qué es la firma digital?"
Learning Exercises for material titled "¿Qué es la firma digital?"
Accessibility Info for material titled "¿Qué es la firma digital?"
eTextbook Reviews for material titled "¿Qué es la firma digital?"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Introducción a los problemas de seguridad en redes de información

La seguridad de la información es ya una disciplina claramente establecida y que no para de crecer, habida cuenta de su... see more
Material Type: Presentation
Author: Gabriel Diaz
Date Added: Apr 28, 2016 Date Modified: Apr 28, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Introducción a los problemas de seguridad en redes de información"
User Rating for material titled "Introducción a los problemas de seguridad en redes de información"
Member Comments for material titled "Introducción a los problemas de seguridad en redes de información"
Bookmark Collections for material titled "Introducción a los problemas de seguridad en redes de información"
Course ePortfolios for material titled "Introducción a los problemas de seguridad en redes de información"
Learning Exercises for material titled "Introducción a los problemas de seguridad en redes de información"
Accessibility Info for material titled "Introducción a los problemas de seguridad en redes de información"
eTextbook Reviews for material titled "Introducción a los problemas de seguridad en redes de información"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 5 average rating
User Rating 5 user rating
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:08): Social Engineering

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at:... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Jun 22, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:08): Social Engineering"
User Rating for material titled "Information Security (06:08): Social Engineering"
Member Comments for material titled "Information Security (06:08): Social Engineering"
Bookmark Collections for material titled "Information Security (06:08): Social Engineering"
Course ePortfolios for material titled "Information Security (06:08): Social Engineering"
Learning Exercises for material titled "Information Security (06:08): Social Engineering"
Accessibility Info for material titled "Information Security (06:08): Social Engineering"
eTextbook Reviews for material titled "Information Security (06:08): Social Engineering"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:07): Malware

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Jul 30, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:07): Malware"
User Rating for material titled "Information Security (06:07): Malware"
Member Comments for material titled "Information Security (06:07): Malware"
Bookmark Collections for material titled "Information Security (06:07): Malware"
Course ePortfolios for material titled "Information Security (06:07): Malware"
Learning Exercises for material titled "Information Security (06:07): Malware"
Accessibility Info for material titled "Information Security (06:07): Malware"
eTextbook Reviews for material titled "Information Security (06:07): Malware"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:06): Internet Security

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Jul 30, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:06): Internet Security"
User Rating for material titled "Information Security (06:06): Internet Security"
Member Comments for material titled "Information Security (06:06): Internet Security"
Bookmark Collections for material titled "Information Security (06:06): Internet Security"
Course ePortfolios for material titled "Information Security (06:06): Internet Security"
Learning Exercises for material titled "Information Security (06:06): Internet Security"
Accessibility Info for material titled "Information Security (06:06): Internet Security"
eTextbook Reviews for material titled "Information Security (06:06): Internet Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:05): Network Security

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Mar 15, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:05): Network Security"
User Rating for material titled "Information Security (06:05): Network Security"
Member Comments for material titled "Information Security (06:05): Network Security"
Bookmark Collections for material titled "Information Security (06:05): Network Security"
Course ePortfolios for material titled "Information Security (06:05): Network Security"
Learning Exercises for material titled "Information Security (06:05): Network Security"
Accessibility Info for material titled "Information Security (06:05): Network Security"
eTextbook Reviews for material titled "Information Security (06:05): Network Security"
About this material:
Peer review 4.5 rating
Peer Reviews 4.5 rating
User review 4 average rating
User Rating 4 user rating
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:04): Protecting Your Data

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Jan 14, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:04): Protecting Your Data"
User Rating for material titled "Information Security (06:04): Protecting Your Data"
Member Comments for material titled "Information Security (06:04): Protecting Your Data"
Bookmark Collections for material titled "Information Security (06:04): Protecting Your Data"
Course ePortfolios for material titled "Information Security (06:04): Protecting Your Data"
Learning Exercises for material titled "Information Security (06:04): Protecting Your Data"
Accessibility Info for material titled "Information Security (06:04): Protecting Your Data"
eTextbook Reviews for material titled "Information Security (06:04): Protecting Your Data"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 1 of 2
2  Next Next Arrow
Jump to page