Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all disciplines
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 21 - 30 shown of 58 results

Health and Wellness for Your Computer

This resource was named the Best Graduate (Professional Studies/Training) Lesson in the 2009 SoftChalk Lesson Challenge.This... see more
Material Type: Tutorial
Author: Suzanne McGinnis, Elizabeth Miles
Date Added: May 08, 2014 Date Modified: Jun 22, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Health and Wellness for Your Computer"
User Rating for material titled "Health and Wellness for Your Computer"
Member Comments for material titled "Health and Wellness for Your Computer"
Bookmark Collections for material titled "Health and Wellness for Your Computer"
Course ePortfolios for material titled "Health and Wellness for Your Computer"
Learning Exercises for material titled "Health and Wellness for Your Computer"
Accessibility Info for material titled "Health and Wellness for Your Computer"
eTextbook Reviews for material titled "Health and Wellness for Your Computer"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 3.5 average rating
User Rating 3.5 user rating
Discussion (1 Comment)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information security for non-technical managers

This is a free textbook from BookBoon'This book presents a non-technical overview of the main elements of managing... see more
Material Type: Open Textbook
Author: Eduardo Gelbstein
Date Added: Sep 30, 2013 Date Modified: Jun 26, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information security for non-technical managers"
User Rating for material titled "Information security for non-technical managers"
Member Comments for material titled "Information security for non-technical managers"
Bookmark Collections for material titled "Information security for non-technical managers"
Course ePortfolios for material titled "Information security for non-technical managers"
Learning Exercises for material titled "Information security for non-technical managers"
Accessibility Info for material titled "Information security for non-technical managers"
eTextbook Reviews for material titled "Information security for non-technical managers"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 1 average rating
User Rating 1 user rating
Discussion (none)
In (2)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Managing Risk and Information Security: Protect to Enable

This is a free textbook that is offered by Amazon for reading on a Kindle.  Anybody can read Kindle books—even without a... see more
Material Type: Open Textbook
Author: Malcolm Harkins
Date Added: Oct 15, 2013 Date Modified: Apr 01, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Managing Risk and Information Security: Protect to Enable"
User Rating for material titled "Managing Risk and Information Security: Protect to Enable"
Member Comments for material titled "Managing Risk and Information Security: Protect to Enable"
Bookmark Collections for material titled "Managing Risk and Information Security: Protect to Enable"
Course ePortfolios for material titled "Managing Risk and Information Security: Protect to Enable"
Learning Exercises for material titled "Managing Risk and Information Security: Protect to Enable"
Accessibility Info for material titled "Managing Risk and Information Security: Protect to Enable"
eTextbook Reviews for material titled "Managing Risk and Information Security: Protect to Enable"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Nework Security

״Encryption of files and firewalls are just some of the security measures that can be used in security. This unit, which... see more
Material Type: Open Textbook
Author: The Open University
Date Added: Jan 18, 2011 Date Modified: Jul 18, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Nework Security"
User Rating for material titled "Nework Security"
Member Comments for material titled "Nework Security"
Bookmark Collections for material titled "Nework Security"
Course ePortfolios for material titled "Nework Security"
Learning Exercises for material titled "Nework Security"
Accessibility Info for material titled "Nework Security"
eTextbook Reviews for material titled "Nework Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Policing Cyber Crime

This is a free, online textbook offered by Bookboon.com.  Topics include:1. Cyber Crime Defined,2. Cyber Crime Cases,3. Child... see more
Material Type: Open Textbook
Author: Peter Gottschalk
Date Added: Jan 12, 2011 Date Modified: Aug 11, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Policing Cyber Crime"
User Rating for material titled "Policing Cyber Crime"
Member Comments for material titled "Policing Cyber Crime"
Bookmark Collections for material titled "Policing Cyber Crime"
Course ePortfolios for material titled "Policing Cyber Crime"
Learning Exercises for material titled "Policing Cyber Crime"
Accessibility Info for material titled "Policing Cyber Crime"
eTextbook Reviews for material titled "Policing Cyber Crime"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Security Awareness at C-Bay

Students work the Help Desk at C-Bay, and develop an employee education program designed to improve network security. This... see more
Material Type: Simulation
Author: Murphy Mike, Sukhjit Singh, Catherine Ayers
Date Added: Jun 25, 2007 Date Modified: Jun 26, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Security Awareness at C-Bay"
User Rating for material titled "Security Awareness at C-Bay"
Member Comments for material titled "Security Awareness at C-Bay"
Bookmark Collections for material titled "Security Awareness at C-Bay"
Course ePortfolios for material titled "Security Awareness at C-Bay"
Learning Exercises for material titled "Security Awareness at C-Bay"
Accessibility Info for material titled "Security Awareness at C-Bay"
eTextbook Reviews for material titled "Security Awareness at C-Bay"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 1 average rating
User Rating 1 user rating
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Welcome to Microsoft's Protect Your PC Site

This site gives information about the significance of software updates and a firewall in protecting the integrity of data on... see more
Material Type: Tutorial
Author: Microsoft Corporation
Date Added: May 05, 2005 Date Modified: Jul 07, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Welcome to Microsoft's Protect Your PC Site"
User Rating for material titled "Welcome to Microsoft's Protect Your PC Site"
Member Comments for material titled "Welcome to Microsoft's Protect Your PC Site"
Bookmark Collections for material titled "Welcome to Microsoft's Protect Your PC Site"
Course ePortfolios for material titled "Welcome to Microsoft's Protect Your PC Site"
Learning Exercises for material titled "Welcome to Microsoft's Protect Your PC Site"
Accessibility Info for material titled "Welcome to Microsoft's Protect Your PC Site"
eTextbook Reviews for material titled "Welcome to Microsoft's Protect Your PC Site"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 5 average rating
User Rating 5 user rating
Discussion (none)
In (1)  Bookmark Collections
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

1SP Ozel Guvenlik Sirketleri Istanbul

ISP Private Security and Protection, Istanbul, Turkey. There is a lot of info about security sector, and industry. You can... see more
Material Type: Presentation
Author: Ozel Guvenlik
Date Added: Aug 19, 2013 Date Modified: Mar 28, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
User Rating for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Member Comments for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Bookmark Collections for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Course ePortfolios for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Learning Exercises for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Accessibility Info for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
eTextbook Reviews for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)

An ideology is defined as a set of ideas that “explains and evaluates social conditions, helps people understand their place... see more
Material Type: Reference Material
Author: Shalin Hai-Jew
Date Added: Mar 20, 2013 Date Modified: Jan 13, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
User Rating for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Member Comments for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Bookmark Collections for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Course ePortfolios for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Learning Exercises for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
Accessibility Info for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
eTextbook Reviews for material titled "Action Potentials: Extrapolating an Ideology from the Anonymous hacker socio-political movement (a qualitative meta-analysis)"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Buffer Exploits and Defenses

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling,... see more
Material Type: Online Course
Author: James Mickens
Date Added: Aug 31, 2016 Date Modified: Sep 20, 2016
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Buffer Exploits and Defenses"
User Rating for material titled "Buffer Exploits and Defenses"
Member Comments for material titled "Buffer Exploits and Defenses"
Bookmark Collections for material titled "Buffer Exploits and Defenses"
Course ePortfolios for material titled "Buffer Exploits and Defenses"
Learning Exercises for material titled "Buffer Exploits and Defenses"
Accessibility Info for material titled "Buffer Exploits and Defenses"
eTextbook Reviews for material titled "Buffer Exploits and Defenses"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 3 of 6
Left Arrow  Prev 1  2  3  4  5  6  Next Next Arrow
Jump to page