MERLOT Materials

Show results for

Filter by

1-24 of 59 results for discipline "IT Security and Risk Management"

This book describes, in 5 volumes, an Integrated Data Protection and Privacy Management System (DP&P System) and a... see more

Having any issue in your accounting software QucikBooks Contact QucikBooks Customer Care Number experts and have... see more

Having any issue in your accounting software QucikBooks Contact QucikBooks Customer Care Number experts and have... see more

The course considers security from the high level down, and considers technical, administrative, and physical aspects of... see more

 These sequence of labs will give you practical experience with common attacks and counter measures.

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling,... see more

This course focuses on the fundamentals of information security that are used in protecting both the information present... see more

Nuevo formato de enseñanza masiva, online y gratuita en seguridad de la información. Es el primer MOOC, Massive Open... see more

No estamos acostumbrados a pensar en las instalaciones industriales como sensibles a problemas de seguridad o, al... see more

Es una disciplina relativamente nueva, constituida por un conjunto de principios y técnicas para poner en marcha los... see more

Se presentan las tecnologías básicas mas usuales en cortafuegos (firewalls) desde su base con las redes privadas y... see more

Introducción a los algoritmos criptográficos simétricos

Esta píldora presenta de manera sucinta en qué consiste la firma digital de los mensajes, qué algoritmos y estructuras... see more

"Social Engineering Fundamentals, Part I: Hacker Tactics” (HTML) by Symantec: Sarah Granger's  Learning Instructions by... see more

La seguridad de la información es ya una disciplina claramente establecida y que no para de crecer, habida cuenta de su... see more

About EFF - "The Electronic Frontier Foundation is the leading nonprofit organization defending... see more is the central source of information on biometrics-related activities of the Federal government. This site... see more

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at:... see more

Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket... see more

Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept... see more

Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more

This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of... see more

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on... see more

The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical... see more