MERLOT Materials
Show results for
Filter by
- Application Development (378)
- Business Process Management (63)
- Data and Information Management (101)
- Enterprise Systems and Architecture (1)
- Foundations of Information Systems (20)
- Human Computer Interaction (19)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (9)
- IT Audit and Controls (11)
- IT Infrastructure (570)
- IT Security and Risk Management (60)
- Knowledge Management (14)
- Social Informatics (29)
- System Analysis and Design (138)
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical... see more
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket... see more
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on... see more
These preview video clips feature authoritative experts in information security and assurance. The complete video and the... see more
Cyber security in business is about protecting online data & offline data from theft and any sort of damage including the... see more
ISP Private Security and Protection, Istanbul, Turkey. There is a lot of info about security sector, and industry. You... see more
Anti-Phishing Phil is an interactive game that teaches users how to identify phishing URLs, where to look for cues in web... see more
About EFF - https://www.eff.org/about "The Electronic Frontier Foundation is the leading nonprofit organization defending... see more
'This introductory text covers media security, starting off by highlighting various types of objective and subjective... see more
'Many people now understand the role of personal hygiene in maintaining good health. Until the 19th Century this was not... see more
This resource was named the Best Graduate (Professional Studies/Training) Lesson in the 2009 SoftChalk Lesson Challenge.... see more
This is a free textbook from BookBoon 'This book presents a non-technical overview of the main elements of managing... see more
"Encryption of files and firewalls are just some of the security measures that can be used in security. This unit, which... see more
This is a free, online textbook offered by Bookboon.com. Topics include: 1. Cyber Crime Defined, 2. Cyber Crime Cases, 3.... see more
No estamos acostumbrados a pensar en las instalaciones industriales como sensibles a problemas de seguridad o, al... see more
"Social Engineering Fundamentals, Part I: Hacker Tactics” (HTML) by Symantec: Sarah Granger's Learning Instructions by... see more
"This book attempts to analyze the history, ideology, organization, exploits, and political motivations of the Chinese... see more
Edureka PGP in Cybersecurity: with Edureka: https://www.edureka.co/post-graduate/... This Edureka video on "Types of... see more
Incorporar herramientas de IA con prisas o por simple moda abre una nuev puerta a los hackers. Siga estos consejos para... see more