Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all disciplines
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 11 - 20 shown of 58 results

An Overview of Steganography for the Computer Forensics Examiner

Created as a training tool for computer forensics technicians, this website provides an abundance of information on the art... see more
Material Type: Presentation
Author: Gary Kessler
Date Added: Dec 01, 2007 Date Modified: Feb 17, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "An Overview of Steganography for the Computer Forensics Examiner"
User Rating for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Member Comments for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Bookmark Collections for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Course ePortfolios for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Learning Exercises for material titled "An Overview of Steganography for the Computer Forensics Examiner"
Accessibility Info for material titled "An Overview of Steganography for the Computer Forensics Examiner"
eTextbook Reviews for material titled "An Overview of Steganography for the Computer Forensics Examiner"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Anti-Phishing Phil

Anti-Phishing Phil is an interactive game that teaches users how to identify phishing URLs, where to look for cues in web... see more
Material Type: Tutorial
Author: Carnegie Mellon University
Date Added: Sep 26, 2007 Date Modified: May 18, 2010
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Anti-Phishing Phil"
User Rating for material titled "Anti-Phishing Phil"
Member Comments for material titled "Anti-Phishing Phil"
Bookmark Collections for material titled "Anti-Phishing Phil"
Course ePortfolios for material titled "Anti-Phishing Phil"
Learning Exercises for material titled "Anti-Phishing Phil"
Accessibility Info for material titled "Anti-Phishing Phil"
eTextbook Reviews for material titled "Anti-Phishing Phil"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Biometrics

Biometrics.gov is the central source of information on biometrics-related activities of the Federal government. This site and... see more
Material Type: Reference Material
Author: U.S. Government
Date Added: Sep 18, 2015 Date Modified: Aug 07, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Biometrics"
User Rating for material titled "Biometrics"
Member Comments for material titled "Biometrics"
Bookmark Collections for material titled "Biometrics"
Course ePortfolios for material titled "Biometrics"
Learning Exercises for material titled "Biometrics"
Accessibility Info for material titled "Biometrics"
eTextbook Reviews for material titled "Biometrics"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Good quality material; may be reviewed
avg: 4 rating

User review 4 average rating
User Rating 4 user rating
Discussion (1 Comment)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion

This is a free, online textbook.  ״Wherever you go‚ whatever you say, write, photograph, or buy‚ whatever prescriptions you... see more
Material Type: Open Textbook
Author: Ken Ledeen, Harry Lewis, Hal Abelson
Date Added: Feb 23, 2010 Date Modified: Jul 21, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
User Rating for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Member Comments for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Bookmark Collections for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Course ePortfolios for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Learning Exercises for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
Accessibility Info for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
eTextbook Reviews for material titled "Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 5 average rating
User Rating 5 user rating
Discussion (1 Comment)
In (4)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (1)

C-Bay's Emergency Response

Students analyze C-Bay’s threats and vunlnerabilities, as well as draft emergency response procedures. Task 6 of a... see more
Material Type: Simulation
Author: Paraminder Talwar, Sukhjit Singh, Catherine Ayers, Mike Murphy
Date Added: Jun 25, 2007 Date Modified: Jan 15, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "C-Bay's Emergency Response"
User Rating for material titled "C-Bay's Emergency Response"
Member Comments for material titled "C-Bay's Emergency Response"
Bookmark Collections for material titled "C-Bay's Emergency Response"
Course ePortfolios for material titled "C-Bay's Emergency Response"
Learning Exercises for material titled "C-Bay's Emergency Response"
Accessibility Info for material titled "C-Bay's Emergency Response"
eTextbook Reviews for material titled "C-Bay's Emergency Response"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

C-Bay's Network Outages

Students analyze and suggest solutions to an onslaught of network outages at C-Bay, an online Real Estate Auction start up.A... see more
Material Type: Simulation
Author: Catherine Ayers, Gillett David, Sukhjit Singh, Mike Murphy
Date Added: Jun 22, 2007 Date Modified: Jan 15, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "C-Bay's Network Outages"
User Rating for material titled "C-Bay's Network Outages"
Member Comments for material titled "C-Bay's Network Outages"
Bookmark Collections for material titled "C-Bay's Network Outages"
Course ePortfolios for material titled "C-Bay's Network Outages"
Learning Exercises for material titled "C-Bay's Network Outages"
Accessibility Info for material titled "C-Bay's Network Outages"
eTextbook Reviews for material titled "C-Bay's Network Outages"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

C-Bay's Security Policy Critique

Designed as part of a network security curriculum, this scenario-based task simulates a challenge for information technology... see more
Material Type: Simulation
Author: Tony Nguyen, Catherine Ayers, Mike Murphy, Sukhjit Singh
Date Added: Jun 20, 2007 Date Modified: Jan 15, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "C-Bay's Security Policy Critique"
User Rating for material titled "C-Bay's Security Policy Critique"
Member Comments for material titled "C-Bay's Security Policy Critique"
Bookmark Collections for material titled "C-Bay's Security Policy Critique"
Course ePortfolios for material titled "C-Bay's Security Policy Critique"
Learning Exercises for material titled "C-Bay's Security Policy Critique"
Accessibility Info for material titled "C-Bay's Security Policy Critique"
eTextbook Reviews for material titled "C-Bay's Security Policy Critique"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Computer Crimes: Security Implications to Minimizing Vulnerability

Computer Crimes: Security Implications to Minimizing Vulnerability There are seven common online blunders that make people... see more
Material Type: Assessment Tool
Author: Azubike Okpalaeze
Date Added: Oct 06, 2009 Date Modified: Jul 02, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
User Rating for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Member Comments for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Bookmark Collections for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Course ePortfolios for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Learning Exercises for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
Accessibility Info for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
eTextbook Reviews for material titled "Computer Crimes: Security Implications to Minimizing Vulnerability"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 5 average rating
User Rating 5 user rating
Discussion (1 Comment)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (1)

CS406: Information Security

This course focuses on the fundamentals of information security that are used in protecting both the information present in... see more
Material Type: Online Course
Author: Saylor Academy http://www.saylor.org/contact/
Date Added: May 01, 2016 Date Modified: Jun 14, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "CS406: Information Security"
User Rating for material titled "CS406: Information Security"
Member Comments for material titled "CS406: Information Security"
Bookmark Collections for material titled "CS406: Information Security"
Course ePortfolios for material titled "CS406: Information Security"
Learning Exercises for material titled "CS406: Information Security"
Accessibility Info for material titled "CS406: Information Security"
eTextbook Reviews for material titled "CS406: Information Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 5 average rating
User Rating 5 user rating
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Data Security

Basic tips for protecting electronic data at work.
Material Type: Tutorial
Author: Cory Lammers
Date Added: Apr 26, 2012 Date Modified: Aug 11, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Data Security"
User Rating for material titled "Data Security"
Member Comments for material titled "Data Security"
Bookmark Collections for material titled "Data Security"
Course ePortfolios for material titled "Data Security"
Learning Exercises for material titled "Data Security"
Accessibility Info for material titled "Data Security"
eTextbook Reviews for material titled "Data Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 5 average rating
User Rating 5 user rating
Discussion (2 Comments)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 2 of 6
Left Arrow  Prev 1  2  3  4  5  6  Next Next Arrow
Jump to page