This collection uses primary sources to compare American responses to Pearl Harbor …
This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
TCP/IP Level Attacks Port Scanning DDoS Footprinting and Social Engineering Enumeration Programming for Security Professionals Operating System Vulnerabilities Embedded System Security Hacking Web Servers Hacking Wireless Networks Cryptography Protecting Networks with Security Devices
Steganography is the science and art of hiding messages in plain sight …
Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.
Students apply the design process to the problem of hiding a message …
Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.
Students learn about infrared energy and how it is used to sense …
Students learn about infrared energy and how it is used to sense the surrounding environment. They review where infrared falls on the electromagnetic spectrum and learn how infrared sensors work, as well as various ways engineers and scientists create and apply infrared technology to study science and collect information for security, communications, medical, research and other purposes. Pre/post-quizzes and a take-home assignment are provided. Learning the concepts prepares students to conduct the associated activity in which they design and program Arduino-controlled robots that use IR sensors to follow a line and make designated stops, much like the automated guided vehicles used in industry and commerce.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.