Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all disciplines
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 31 - 40 shown of 60 results

Security Essentials for Windows XP

Microsoft provides this Web site to deal with several types of security issues incuding viruses, hackers, and spyware. ... see more
Material Type: Tutorial
Author: Microsoft Corporation
Date Added: Jan 10, 2006 Date Modified: Jan 15, 2006
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Security Essentials for Windows XP"
User Rating for material titled "Security Essentials for Windows XP"
Member Comments for material titled "Security Essentials for Windows XP"
Bookmark Collections for material titled "Security Essentials for Windows XP"
Course ePortfolios for material titled "Security Essentials for Windows XP"
Learning Exercises for material titled "Security Essentials for Windows XP"
Accessibility Info for material titled "Security Essentials for Windows XP"
eTextbook Reviews for material titled "Security Essentials for Windows XP"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (1)
Accessibility Info (none)

1SP Ozel Guvenlik Sirketleri Istanbul

ISP Private Security and Protection, Istanbul, Turkey. There is a lot of info about security sector, and industry. You can... see more
Material Type: Presentation
Author: Ozel Guvenlik
Date Added: Aug 19, 2013 Date Modified: Jan 01, 2018
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
User Rating for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Member Comments for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Bookmark Collections for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Course ePortfolios for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Learning Exercises for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
Accessibility Info for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
eTextbook Reviews for material titled "1SP Ozel Guvenlik Sirketleri Istanbul"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Buffer Exploits and Defenses

In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling,... see more
Material Type: Online Course
Author: James Mickens
Date Added: Aug 31, 2016 Date Modified: Feb 06, 2018
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Buffer Exploits and Defenses"
User Rating for material titled "Buffer Exploits and Defenses"
Member Comments for material titled "Buffer Exploits and Defenses"
Bookmark Collections for material titled "Buffer Exploits and Defenses"
Course ePortfolios for material titled "Buffer Exploits and Defenses"
Learning Exercises for material titled "Buffer Exploits and Defenses"
Accessibility Info for material titled "Buffer Exploits and Defenses"
eTextbook Reviews for material titled "Buffer Exploits and Defenses"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review
Very good quality; in queue to be peer reviewed
avg: 5 rating

User review 4 average rating
User Rating 4 user rating
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I

This book describes, in 5 volumes, an Integrated Data Protection and Privacy Management System (DP&P System) and a... see more
Material Type: Open (Access) Textbook
Author: John Kyriazoglou
Date Added: Jan 11, 2018 Date Modified: Jan 11, 2018
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
User Rating for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
Member Comments for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
Bookmark Collections for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
Course ePortfolios for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
Learning Exercises for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
Accessibility Info for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
eTextbook Reviews for material titled "Data Protection and Privacy Management System Data Protection and Privacy Guide – Vol I"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

DNS con Bind9 en CentOS

Instalación básica de un DNS con bind9 en modo seguro con chroot
Material Type: Tutorial
Author: Roy Alvear, Mauricio Vasquez
Date Added: May 26, 2012 Date Modified: Jun 29, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "DNS con Bind9 en CentOS"
User Rating for material titled "DNS con Bind9 en CentOS"
Member Comments for material titled "DNS con Bind9 en CentOS"
Bookmark Collections for material titled "DNS con Bind9 en CentOS"
Course ePortfolios for material titled "DNS con Bind9 en CentOS"
Learning Exercises for material titled "DNS con Bind9 en CentOS"
Accessibility Info for material titled "DNS con Bind9 en CentOS"
eTextbook Reviews for material titled "DNS con Bind9 en CentOS"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Electronic Frontier Foundation

About EFF - https://www.eff.org/about"The Electronic Frontier Foundation is the leading nonprofit organization defending... see more
Material Type: Reference Material
Author: Electronic Frontier Foundation (EFF) - https://www.eff.org/
Date Added: Dec 01, 2015 Date Modified: Dec 01, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Electronic Frontier Foundation"
User Rating for material titled "Electronic Frontier Foundation"
Member Comments for material titled "Electronic Frontier Foundation"
Bookmark Collections for material titled "Electronic Frontier Foundation"
Course ePortfolios for material titled "Electronic Frontier Foundation"
Learning Exercises for material titled "Electronic Frontier Foundation"
Accessibility Info for material titled "Electronic Frontier Foundation"
eTextbook Reviews for material titled "Electronic Frontier Foundation"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Fundamentals of Media Security

This is a free textbook offered by BookBoon.'This introductory text covers media security, starting off by highlighting... see more
Material Type: Open (Access) Textbook
Author: WeiQi Yan, Jonathan Weir
Date Added: Feb 25, 2014 Date Modified: May 10, 2017
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Fundamentals of Media Security"
User Rating for material titled "Fundamentals of Media Security"
Member Comments for material titled "Fundamentals of Media Security"
Bookmark Collections for material titled "Fundamentals of Media Security"
Course ePortfolios for material titled "Fundamentals of Media Security"
Learning Exercises for material titled "Fundamentals of Media Security"
Accessibility Info for material titled "Fundamentals of Media Security"
eTextbook Reviews for material titled "Fundamentals of Media Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 4 average rating
User Rating 4 user rating
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Good Digital Hygiene A guide to staying secure in cyberspace

This is a free textbook offered by BookBoon.'Many people now understand the role of personal hygiene in maintaining good... see more
Material Type: Open (Access) Textbook
Author: Eduardo Gelbstein
Date Added: Feb 05, 2014 Date Modified: Feb 05, 2014
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
User Rating for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Member Comments for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Bookmark Collections for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Course ePortfolios for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Learning Exercises for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
Accessibility Info for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
eTextbook Reviews for material titled "Good Digital Hygiene A guide to staying secure in cyberspace"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

How your network can be scanned

PowerPoint showing how a network is scanned and information is gathered about target computers
Material Type: Presentation
Author: Steve Mallard
Date Added: Jul 07, 2012 Date Modified: Jul 07, 2012
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "How your network can be scanned"
User Rating for material titled "How your network can be scanned"
Member Comments for material titled "How your network can be scanned"
Bookmark Collections for material titled "How your network can be scanned"
Course ePortfolios for material titled "How your network can be scanned"
Learning Exercises for material titled "How your network can be scanned"
Accessibility Info for material titled "How your network can be scanned"
eTextbook Reviews for material titled "How your network can be scanned"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Information Security

This course focuses on the fundamentals of information security -- protection of the information present in computer storage... see more
Material Type: Online Course
Author: The Saylor Foundation
Date Added: Jan 27, 2012 Date Modified: Mar 01, 2017
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Information Security"
User Rating for material titled "Information Security"
Member Comments for material titled "Information Security"
Bookmark Collections for material titled "Information Security"
Course ePortfolios for material titled "Information Security"
Learning Exercises for material titled "Information Security"
Accessibility Info for material titled "Information Security"
eTextbook Reviews for material titled "Information Security"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User review 3.33 average rating
User Rating 3.33 user rating
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 4 of 6
Left Arrow Prev 1  2  3  4  5  6  Next Next Arrow
Jump to page