MERLOT Materials
Show results for
Filter by
- Application Development (378)
- Business Process Management (63)
- Data and Information Management (101)
- Enterprise Systems and Architecture (1)
- Foundations of Information Systems (20)
- Human Computer Interaction (19)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (9)
- IT Audit and Controls (11)
- IT Infrastructure (570)
- IT Security and Risk Management (60)
- Knowledge Management (14)
- Social Informatics (29)
- System Analysis and Design (138)
This is a tutorial on computer viruses. It discusses what computer viruses are, gives some history, and discusses... see more
This demonstration module provides an overview of the key concepts and goals of information security and how information... see more
A brief overview of cryptographic concepts with a number of specific examples of RSA, IPSec, AES, DES, Diffie-Hellman,... see more
Created as a training tool for computer forensics technicians, this website provides an abundance of information on the... see more
This is a free, online textbook. "Wherever you go‚ whatever you say, write, photograph, or buy‚ whatever prescriptions... see more
This book describes, in 5 volumes, an Integrated Data Protection and Privacy Management System (DP&P System) and a... see more
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of... see more
The course considers security from the high level down, and considers technical, administrative, and physical aspects of... see more
The Internet of Things (IoT) Scanner by BullGuard allows you to check if your internet-connected devices (webcams, smart... see more
This is a free textbook that is offered by Amazon for reading on a Kindle. Anybody can read Kindle books—even without a... see more
Risk analysis is often viewed as a black artpart fortune telling, part mathematics. Successful risk analysis, however,... see more
the U.S. Computer Emergency Readiness Team describes tips and offer advice about common security issues for non-technical... see more
This site gives information about the significance of software updates and a firewall in protecting the integrity of data... see more
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at:... see more
An ideology is defined as a set of ideas that “explains and evaluates social conditions, helps people understand their... see more
This course focuses on the fundamentals of information security that are used in protecting both the information present... see more
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired),... see more
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept... see more
The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s... see more
La ingeniería inversa abarca un amplio espectro de actividades destinadas a la extracción de información sobre la... see more
In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling,... see more
Biometrics.gov is the central source of information on biometrics-related activities of the Federal government. This site... see more
Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the... see more