MERLOT Materials

Show results for

Filter by

1-24 of 27 results for: MERLOT Materials

This free course, Introduction to cyber security: stay safe online, will help you to understand online security and start... see more

Information security underpins the commercial viability and profitability of enterprises of all sizes and the... see more

This is an interactive demo of the internal process of how the AES blockcipher (Rijndael) operates. It was made for the... see more

This material provides a lecture note on AES encryption. It can be used with the following video as well:  ... see more

This is an online demo in Flash to show how to use Hamming code for error correction.

CSRankings.org is designed to identify institutions and faculty actively engaged in research across a number of areas of... see more

This course is designed to help students (primarily incoming college freshmen) develop the foundational computing and... see more

Part of the SpringerBriefs in Law book series (BRIEFSLAW)

Cyberspace touches practically everything and everyone when many everyday communications depend on information... see more

This guide contains a set of guidelines related to protecting the personal data of a private company or public... see more

This book describes, in 5 volumes, an Integrated Data Protection and Privacy Management System (DP&P System) and a... see more

Students learn how alphanumeric symbols can be encoded for a multitude of fun purposes. In the first of two sessions... see more

The explosive growth in the adoption of electronic devices by the general population (computers in various forms,... see more

This website provides an introduction to cryptography.

Anyone hoping for an IT career needs to know something of how the IT industry is affected by the law. This textbook gives... see more

It is an encryption method that uses substitution with bit stream encoding.  It is able encrypt and decrypt with low and... see more

Peer J Computer Science is the new open access, peer-reviewed, scholarly journal covering all subject areas of computer... see more

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10804) Also part of the Security and... see more

This web page presents a proof of the RSA algorithm together with the basic theorems (Chinese Remainder Theorem... see more

This video provides an introduction to the Diffie-Hellman Key Exchange protocol. It can be played in a lecture.

This video provides an introduction to RSA encryption. It can be played in a lecture.

It is a new symmetric ‘key’ exchange mechanism between two unknown parties which is robust and flexible. It uses... see more

This website gives an overview of the simplfied DES method with an example, which can be used to teach the basic concept... see more