MERLOT Materials

Show results for

Filter by

73-96 of 2,192 results for discipline "Information Technology"

Information management from a data mining perspective: use of statistical methods in information retriaval and knwledge... see more

 It discusses the different stages involved in developing good and functional information technology, different ways of... see more

This course deals with the management of information technology (IT) as it is being practiced in organizations today.... see more

Learning from data in order to gain useful predictions and insights. This course introduces methods for five key facets... see more

This is a free textbook offered by BookBoon. In the second part of Using Concurrency and Parallelism Effectively we look... see more

This free 6 week massive open online course (MOOC) from UNSW Australia begins a new session every month. Enrol any time.... see more

When writing exams, many computing educators find themselves wishing there existed repositories from which they could... see more

Use Kodu Game Lab to learn how to program a tower defense style game that can run on both a PC and Xbox.

This course is the first lesson from the Teaching Kids Programming courseware library. It has been designed especially... see more

Interested in learning how to program your computer? Interested in Computer Science? Interested in the connections... see more

Learn how to create Android applications using App Inventor, and learn about some basic programming concepts along the... see more

Managing Information Technology projects within an organizational context, including the processes related to initiating,... see more

this document presents a series of labs to initiate students to the basics concepts of pragramming using the C language

"Advanced Network Infrastructure 2015" is designed to provide a broad audience of IT decision makers - from the CIO to... see more

 These sequence of labs will give you practical experience with common attacks and counter measures.

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling,... see more

What is the limit of compression? Huffman codes are introduced in order to demonstrate how entropy is the ultimate limit... see more

A short story about the need for digital communication and how it leads to coding theory (variable length source coding)... see more

How do we communicate digital information reliably in the presence of noise? Hamming's error correction code demonstrates... see more

Introduction to channel capacity, symbol rate (baud) & message space. This is the first step towards more modern measures... see more

The best way to understand complex data structures is to see them in action. We've developed interactive animations for a... see more

How to find least-cost paths in a graph using Dijkstra's Algorithm.

There are a number of utilities available to accomplish the essential task of transferring data and/or code between the... see more

This tutorial is for the beginning Linux user, intended to get the user acquainted with some of the basic principles of... see more