Fortæl dine venner om denne vare:
Protecting Patron Privacy: Safe Practices for Public Computers Matthew Beckstrom
Bestilles fra fjernlager
Julegaver kan byttes frem til 31. januar
Protecting Patron Privacy: Safe Practices for Public Computers
Matthew Beckstrom
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.
Marc Notes: Includes bibliographical references and index.; Protect patron privacy and safeguard internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. Table of Contents: CONTENTS "Foreword by Barbara Jones" Chapter 1: Privacy and How It is Lost Chapter 2: Staff Procedures and Policy Chapter 3: Patron Education Chapter 4: Network Security and Devices Chapter 5: Windows Settings and Applications Chapter 6: Browser Settings and Plug-Ins "Index"Biographical Note: Matthew Beckstrom is a systems manager at Lewis & Clark Library, Helena, MT, and a frequent presenter at conferences on library technology and privacy. Publisher Marketing: In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research--if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.
| Medie | Bøger Paperback Bog (Bog med blødt omslag og limet ryg) |
| Udgivet | 30. juni 2015 |
| ISBN13 | 9781610699969 |
| Forlag | ABC-CLIO |
| Antal sider | 104 |
| Mål | 155 × 231 × 5 mm · 204 g |
| Sprog | Engelsk |
Mere med Matthew Beckstrom
Vis alleSe alt med Matthew Beckstrom ( f.eks. Hardcover bog og Paperback Bog )