Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all disciplines
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 1 - 10 shown of 58 results

Computer Knowledge Virus Tutorial

This is a tutorial on computer viruses. It discusses what computer viruses are, gives some history, and discusses protection... see more
Material Type: Tutorial
Author: Computer Knowledge
Date Added: Mar 24, 2001 Date Modified: Nov 30, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Computer Knowledge Virus Tutorial"
User Rating for material titled "Computer Knowledge Virus Tutorial"
Member Comments for material titled "Computer Knowledge Virus Tutorial"
Bookmark Collections for material titled "Computer Knowledge Virus Tutorial"
Course ePortfolios for material titled "Computer Knowledge Virus Tutorial"
Learning Exercises for material titled "Computer Knowledge Virus Tutorial"
Accessibility Info for material titled "Computer Knowledge Virus Tutorial"
eTextbook Reviews for material titled "Computer Knowledge Virus Tutorial"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User review 3.88 average rating
User Rating 3.88 user rating
Discussion (13 Comments)
In (15)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security Management Concepts

This demonstration module provides an overview of the key concepts and goals of information security and how information... see more
Material Type: Collection
Author: Matt Rose
Date Added: Jan 16, 2003 Date Modified: Nov 06, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security Management Concepts"
User Rating for material titled "Information Security Management Concepts"
Member Comments for material titled "Information Security Management Concepts"
Bookmark Collections for material titled "Information Security Management Concepts"
Course ePortfolios for material titled "Information Security Management Concepts"
Learning Exercises for material titled "Information Security Management Concepts"
Accessibility Info for material titled "Information Security Management Concepts"
eTextbook Reviews for material titled "Information Security Management Concepts"
About this material:
Peer review 4.5 rating
Peer Reviews 4.5 rating
User review 3.33 average rating
User Rating 3.33 user rating
Discussion (1 Comment)
In (18)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

An Overview of Cryptography

A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES, Diffie-Hellman, and... see more
Material Type: Tutorial
Author: Gary Kessler
Date Added: Dec 30, 2002 Date Modified: Oct 21, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "An Overview of Cryptography"
User Rating for material titled "An Overview of Cryptography"
Member Comments for material titled "An Overview of Cryptography"
Bookmark Collections for material titled "An Overview of Cryptography"
Course ePortfolios for material titled "An Overview of Cryptography"
Learning Exercises for material titled "An Overview of Cryptography"
Accessibility Info for material titled "An Overview of Cryptography"
eTextbook Reviews for material titled "An Overview of Cryptography"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User review 4 average rating
User Rating 4 user rating
Discussion (1 Comment)
In (7)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

US-CERT Cyber Security Tips

the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more
Material Type: Presentation
Author: United States Computer Emergency Readiness Team
Date Added: Apr 27, 2005 Date Modified: Feb 06, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "US-CERT Cyber Security Tips"
User Rating for material titled "US-CERT Cyber Security Tips"
Member Comments for material titled "US-CERT Cyber Security Tips"
Bookmark Collections for material titled "US-CERT Cyber Security Tips"
Course ePortfolios for material titled "US-CERT Cyber Security Tips"
Learning Exercises for material titled "US-CERT Cyber Security Tips"
Accessibility Info for material titled "US-CERT Cyber Security Tips"
eTextbook Reviews for material titled "US-CERT Cyber Security Tips"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User review 4.25 average rating
User Rating 4.25 user rating
Discussion (2 Comments)
In (6)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:05): Network Security

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Mar 15, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:05): Network Security"
User Rating for material titled "Information Security (06:05): Network Security"
Member Comments for material titled "Information Security (06:05): Network Security"
Bookmark Collections for material titled "Information Security (06:05): Network Security"
Course ePortfolios for material titled "Information Security (06:05): Network Security"
Learning Exercises for material titled "Information Security (06:05): Network Security"
Accessibility Info for material titled "Information Security (06:05): Network Security"
eTextbook Reviews for material titled "Information Security (06:05): Network Security"
About this material:
Peer review 4.5 rating
Peer Reviews 4.5 rating
User review 4 average rating
User Rating 4 user rating
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Buffer Overflow Lab

 These sequence of labs will give you practical experience with common attacks and counter measures.
Material Type: Assignment
Author: Nickolai Zeldovich
Date Added: Aug 31, 2016 Date Modified: Nov 14, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Buffer Overflow Lab"
User Rating for material titled "Buffer Overflow Lab"
Member Comments for material titled "Buffer Overflow Lab"
Bookmark Collections for material titled "Buffer Overflow Lab"
Course ePortfolios for material titled "Buffer Overflow Lab"
Learning Exercises for material titled "Buffer Overflow Lab"
Accessibility Info for material titled "Buffer Overflow Lab"
eTextbook Reviews for material titled "Buffer Overflow Lab"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:04): Protecting Your Data

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Nov 13, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:04): Protecting Your Data"
User Rating for material titled "Information Security (06:04): Protecting Your Data"
Member Comments for material titled "Information Security (06:04): Protecting Your Data"
Bookmark Collections for material titled "Information Security (06:04): Protecting Your Data"
Course ePortfolios for material titled "Information Security (06:04): Protecting Your Data"
Learning Exercises for material titled "Information Security (06:04): Protecting Your Data"
Accessibility Info for material titled "Information Security (06:04): Protecting Your Data"
eTextbook Reviews for material titled "Information Security (06:04): Protecting Your Data"
About this material:
Peer review 5 rating
Peer Reviews 5 rating
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:02): Physical Security

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Nov 06, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:02): Physical Security"
User Rating for material titled "Information Security (06:02): Physical Security"
Member Comments for material titled "Information Security (06:02): Physical Security"
Bookmark Collections for material titled "Information Security (06:02): Physical Security"
Course ePortfolios for material titled "Information Security (06:02): Physical Security"
Learning Exercises for material titled "Information Security (06:02): Physical Security"
Accessibility Info for material titled "Information Security (06:02): Physical Security"
eTextbook Reviews for material titled "Information Security (06:02): Physical Security"
About this material:
Peer review 4.5 rating
Peer Reviews 4.5 rating
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security (06:07): Malware

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term... see more
Material Type: Presentation
Author: Scott Ford
Date Added: Sep 21, 2014 Date Modified: Oct 27, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security (06:07): Malware"
User Rating for material titled "Information Security (06:07): Malware"
Member Comments for material titled "Information Security (06:07): Malware"
Bookmark Collections for material titled "Information Security (06:07): Malware"
Course ePortfolios for material titled "Information Security (06:07): Malware"
Learning Exercises for material titled "Information Security (06:07): Malware"
Accessibility Info for material titled "Information Security (06:07): Malware"
eTextbook Reviews for material titled "Information Security (06:07): Malware"
About this material:
Peer review 4.5 rating
Peer Reviews 4.5 rating
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security Principles: An Overview

These preview video clips feature authoritative experts in information security and assurance. The complete video and the... see more
Material Type: Presentation
Author: Matt Rose
Date Added: Jan 16, 2003 Date Modified: Oct 03, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security Principles: An Overview"
User Rating for material titled "Information Security Principles: An Overview"
Member Comments for material titled "Information Security Principles: An Overview"
Bookmark Collections for material titled "Information Security Principles: An Overview"
Course ePortfolios for material titled "Information Security Principles: An Overview"
Learning Exercises for material titled "Information Security Principles: An Overview"
Accessibility Info for material titled "Information Security Principles: An Overview"
eTextbook Reviews for material titled "Information Security Principles: An Overview"
About this material:
Peer review 3 rating
Peer Reviews 3 rating
User Rating (not rated)
Discussion (none)
In (4)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 1 of 6
2  3  4  5  6  Next Next Arrow
Jump to page