Updating search results...

Search Resources

2902 Results

View
Selected filters:
  • Computer Science
Curso de Programação Orientada a Objetos
Unrestricted Use
CC BY
Rating
0.0 stars

Curso de Programação Orientada a Objetos criado na ferramenta Moodle, aplicado em alunos de 2 universidades brasileiras, como parte do experimentos realizados na dissertação de mestrado, entitulada "O Uso de Recursos Educacionais Abertos para ensinar Orientação a Objetos na transição do Paradigma Procedimental".

Objective-oriented Programming Course created in the master's dissertation entitled "The Use of Open Educational Resources for Mentoring in Achieving a Goal on the Paradigm of the Procedure".

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Author:
Rodrigo Vieira Pinto
Date Added:
03/24/2018
CurvedLand: An Applet to Simulate Curved Space
Unrestricted Use
CC BY
Rating
0.0 stars

CurvedLand is an applet for showing what the world would look like with different geometry. It is named CurvedLand in tribute to the science fiction novel, Flatland, by Edwin Abbott, which describes the adventures of a two-dimensional being who is visited by a stranger from the third dimension.

One of the central ideas of Einstein's theory of relativity is that space and time curve in response to the matter and energy within them. A curved space is one that doesn't obey the usual laws of Euclidean geometry: the angles of a triangle don't generally add up to 180 degrees, the circumference of a circle isn't pi times the diameter, parallel lines can either converge towards each other or move apart, and so on.

Since the geometry we observe is very close to Euclidean, however, it is hard for most of us to picture what this difference would mean physically. If you draw a circle and a diameter, how could the ratio be anything other than pi? To answer this question, imagine that as you move around in space the shapes of objects appear to distort. This is what happens in curved space. If you draw a circle around yourself and then start walking around it to pace out the circumference, it will look to you like you are walking along a constantly changing ellipse.

CurvedLand illustrates this distortion as it would appear in a two-dimensional curved space. The structure is similar to a mapping program. You can place objects of different shapes in different places in the world and then move around the space to see what they look like from different perspectives.

Subject:
Applied Science
Computer Science
Geometry
Mathematics
Physical Science
Physics
Material Type:
Activity/Lab
Provider:
Smith College
Author:
Gary Felder
Stephanie Erickson
Date Added:
07/29/2020
Curve digitization package
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

You may have already had to digitize a curve from an original document in the form of an image, which is quite tedious to do by hand.

To facilitate the digitization of curves, we have created a small utility that allows you to display on the screen the previously scanned image of a graph, then to very easily record the points of the curves you are interested in (up to 2000).

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Diagram/Illustration
Homework/Assignment
Interactive
Author:
Renaud Gicquel
Date Added:
11/02/2023
Cyber Security Economics
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.

Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
TU Delft OpenCourseWare
Author:
Dr. Ir. Carlos Hernandez Gañán
Dr. Rainer Böhme
Dr. Tyler Moore
Prof.dr. Michel van Eeten
Prof.dr. Ross Anderson
Date Added:
08/16/2019
Cyber Society
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This resource is published by cyber.org.Cyber Society is a resource that explores how cyber affects our everyday lives and how to become more educated members of our cyber society. The content lives on an LMS that is maintained by CYBER.ORG. This link will take you to an informational page where you can request access to the rest of the content.

Subject:
Arts and Humanities
Computer Science
Information Science
Political Science
Material Type:
Unit of Study
Author:
Cyber Citizenship Initiative
Date Added:
08/08/2021
Cyberbullying: A comic story
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This is a comic book about cyberbullying. Use it with grades 3rd-6th to discuss what cyberbullying is and how you can stand against it.

Subject:
Computer Science
Material Type:
Lesson Plan
Author:
Wendy Torres
Date Added:
03/18/2018
Cyberbullying And Impacts of Cyberbullying
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

CYBER BULLYING

Cyber bullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyber bullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyber bullying crosses the line into unlawful or criminal behavior.

The most common places where cyber bullying occurs are:

Social Media, such as Facebook, Instagram, Snapchat, and Twitter
SMS (Short Message Service) also known as Text Message sent through devices
Instant Message (via devices, email provider services, apps, and social media messaging features)
Email.

WHERE IS CYBERBULLYING OCCURING ?

Manuals to educate the public, teachers and parents summarize, "Cyberbullying is being cruel to others by sending or posting harmful material using a cell phone or the internet." Research, legislation and education in the field are ongoing. Research has identified basic definitions and guidelines to help recognize and cope with what is regarded as abuse of electronic communications.

Cyberbullying involves repeated behavior with intent to harm.
Cyberbullying is perpetrated through harassment, cyberstalking, denigration (sending or posting cruel rumors and falsehoods to damage reputation and friendships), impersonation, and exclusion (intentionally and cruelly excluding someone from an online group)
Cyberbullying can be as simple as continuing to send emails or text messages harassing someone who has said they want no further contact with the sender. It may also include public actions such as repeated threats, sexual remarks, pejorative labels (i.e., hate speech) or defamatory false accusations, ganging up on a victim by making the person the subject of ridicule in online forums, hacking into or vandalizing sites about a person, and posting false statements as fact aimed a discrediting or humiliating a targeted person. Cyberbullying could be limited to posting rumors about a person on the internet with the intention of bringing about hatred in others' minds or convincing others to dislike or participate in online denigration of a target. It may go to the extent of personally identifying victims of crime and publishing materials severely defaming or humiliating them.

Cyberbullies may disclose victims' personal data (e.g. real name, home address, or workplace/schools) at websites or forums or may use impersonation, creating fake accounts, comments or sites posing as their target for the purpose of publishing material in their name that defames, discredits or ridicules them. This can leave the cyberbully anonymous which can make it difficult for the offender to be caught or punished for their behavior, although not all cyberbullies maintain their anonymity. Text or instant messages and emails between friends can also constitute cyber bullying if what is said or displayed is hurtful to the participants.
The recent use of mobile applications and rise of smartphones have yielded to a more accessible form of . It is expected that cyber bullying via these platforms will be associated with bullying via mobile phones to a greater extent than exclusively through other more stationary internet platforms. In addition, the combination of cameras and Internet access and the instant availability of these modern smartphone technologies yield themselves to specific types of cyber bullying not found in other platforms. It is likely that those cyber bullied via mobile devices will experience a wider range of cyber bullying types than those exclusively bullied elsewhere.

Subject:
Applied Science
Computer Science
Material Type:
Homework/Assignment
Author:
Mounika
Date Added:
11/12/2017
Cyberbullying Lesson Plan
Rating
0.0 stars

The goal of this lesson plan is for students to be able to learn to identify, respond to, and limit the negative impact of cyberbullying and other unethical or harmful online behaviors through providing various resources and an interactive board game that we have created.

Subject:
Applied Science
Career and Technical Education
Computer Science
Education
Electronic Technology
Elementary Education
Material Type:
Activity/Lab
Assessment
Author:
anna ketsen
colin johnson
stephanie m
karly berger
Date Added:
03/18/2018
Cybercrime and Cyber security Techniques
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cyberinfrastructure
Read the Fine Print
Rating
0.0 stars

Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and sensor resources which will enable individual researchers to have the power of the world's highest-performance digital resources at their disposal. NSF has funded or is exploring cyberinfrastructure-related projects designed to lead the scientific and engineering community in the coordinated development and expansive use of cyberinfrastructure.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Lecture
Provider:
NSDL Staff
Provider Set:
National Science Foundation (NSF) Special Reports and Videos
Date Added:
11/06/2014
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 4 PCI Credit Card Data Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Payment Card Industry (PCI) has created an industry-wide digital security standard. All companies, large and small, that deal with customers’ credit card information, must comply with the PCI Digital Security Standard. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:

- What is PCI/credit card data security?
- Why do small businesses need to plan for PCI security compliance?
- Tools and tips to check PCI compliance of your credit card payment processor or payment gateway provider
and website hosting service provider.
- IT audit requirements and stages for PCI compliance.
 
Presentation Time: 50 minutes plus 10 minutes Q&A.
Presentation Recording: Webinar recorded by SCORE (www.score.org). SCORE is a non-profit organization. URL link: https://drive.google.com/file/d/1HI7iFrTo8xX7o1C_OmmzybpSo6X2Op29/view?usp=drive_link

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson
Author:
Henry S. Teng
Date Added:
04/12/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
Cybersecurity Risk Quantification
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This textbook offers a full 7-week college undergraduate/graduate course on cybersecurity risk quantification. A companion Excel-based toolkit with models is included and available for download in the book's resource section.

No prior experience with risk quantification is required.

The course is divided into seven modules. Students are introduced to basic and advanced methods and models for quantifying cyber risk. Students will perform a risk analysis and present their findings in week 7. In module 1, they are given background information for the course project and their first basic tool for quantifying risk. In module 2, they learn how to analyze vulnerability data and receive another tool to complete that work. In module 3, they will perform an attack analysis based on a scenario they will develop, and they are given their first model to quantify that risk. In module 4, they are given several tools and a fully functional FAIR-compliant model, and they will quantify risk in financial terms. In module 5, they are given two advanced models: a probability tree and a Bayesian Inference model. In module 6 students focus on best practices for present their results and communiating risk. In module 7, students deliver their analysis.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Boise State University
Author:
Charlene Deaver-Vazquez
Date Added:
07/26/2024
Cyber security Techniques- What Is The Internet?
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The lecture presents information about how the Internet works so students studying cyber security can better understand how cybercriminals commit their crimes. The lecture provides elemental concepts so students of all disciplines, from computer engineering to criminal justice and law can obtain a basic foundation.

Subject:
Applied Science
Career and Technical Education
Computer Science
Criminal Justice
Material Type:
Activity/Lab
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Shalom Cohen
Date Added:
04/29/2020
Cybersecurity and crime
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/14/2021