MERLOT Materials
Filter by
- Algorithms and Complexity (61)
- Architecture and Organization (29)
- Computational Science (62)
- Discrete Structures (37)
- Graphics and Visualization (19)
- Human-Computer Interaction (171)
- Information Assurance and Security (40)
- Information Management (193)
- Intelligent Systems (431)
- Networking and Communication (965)
- Operating Systems (33)
- Parallel and Distributed Computing (7)
- Platform-based Development (11)
- Programming & Programming Languages (4,671)
- Social Issues and Professional Practice (26)
- Software Development (81)
- Software Engineering (69)
Information security underpins the commercial viability and profitability of enterprises of all sizes and the... see more
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer... see more
Cybercrime is a growing, global problem. Whether you are a small business, a Fortune 500 company, buying your first... see more
This free course, Introduction to cyber security: stay safe online, will help you to understand online security and start... see more
CSRankings.org is designed to identify institutions and faculty actively engaged in research across a number of areas of... see more
This is a set of PowerPoint slides for a course in FinTech This course covers the foundation of FinTech application and... see more
This book explains step-by-step how to configure a Palo Alto firewall in the network. Each chapter begins with learning... see more
This is an interactive demo of the internal process of how the AES blockcipher (Rijndael) operates. It was made for the... see more
This material provides a lecture note on AES encryption. It can be used with the following video as well:... see more
This course is designed to help students (primarily incoming college freshmen) develop the foundational computing and... see more
Cyberspace touches practically everything and everyone when many everyday communications depend on information... see more
Students learn how alphanumeric symbols can be encoded for a multitude of fun purposes. In the first of two sessions... see more
Through a Round Twelve ALG Mini-Grant for Ancillary Materials Creation and Revision, five new modules have been added to... see more
Staying safe online is essential in today's world. Use these Internet safety tips to keep yourself and your loved ones... see more
Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause... see more
Peer J Computer Science is the new open access, peer-reviewed, scholarly journal covering all subject areas of computer... see more
Information security affects everyone; we all need to be vigilant. Firms suffering a security breach can experience... see more
This web page presents a proof of the RSA algorithm together with the basic theorems (Chinese Remainder Theorem and... see more