Atnaujinkite slapukų nuostatas

El. knyga: User Privacy: A Practical Guide for Librarians

  • Formatas: EPUB+DRM
  • Serija: Practical Guides for Librarians
  • Išleidimo metai: 19-Jan-2018
  • Leidėjas: Rowman & Littlefield Publishers
  • Kalba: eng
  • ISBN-13: 9781442276338
Kitos knygos pagal šią temą:
  • Formatas: EPUB+DRM
  • Serija: Practical Guides for Librarians
  • Išleidimo metai: 19-Jan-2018
  • Leidėjas: Rowman & Littlefield Publishers
  • Kalba: eng
  • ISBN-13: 9781442276338
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Personal data in the online world has become a commodity. Coveted by criminals, demanded by governments, and used for unsavory purposes by marketers and advertisers, your private information is at risk everywhere. For libraries and librarians, this poses a professional threat as well as a personal one. How can we protect the privacy of library patrons and users who browse our online catalogs, borrow sensitive materials, and use our public computers and networks?

User Privacy: A Practical Guide for Librarians answers that question. Through simple explanations and detailed, step-by-step guides, library professionals will learn how to strengthen privacy protections for:

·Library policies ·Wired and wireless networks ·Public computers ·Web browsers ·Mobile devices ·Apps ·Cloud computing

Each chapter begins with a "threat assessment" that provides an overview of the biggest security risks and the steps that can be taken to deal with them. Also covered are techniques for preserving online anonymity, protecting activists and at-risk groups, and the current state of data encryption.

Recenzijos

In light of recent headlines about the data breaches at Facebook, Equifax, etc., public concern about the security of personal information is at an all-time high. Libraries have a duty to take precautions to protect patrons' privacy. This guide summarizes the issues involved in user privacy. The threats to user privacy have increased tremendously since records and library catalogs were first computerized many years ago. Connolly (Cornell Univ. Library) offers recommendations for developing a library privacy policy based on guidelines from the American Library Association. Most of the book focuses on the technical aspects of strengthening a librarys technology infrastructure based on the policy chosen. Securing browsers used by the public and library systems (patron records, online public access catalogs, and ransomware, for example) are of particular concern. In the last several years, users have begun connecting their mobile devices to library wireless networks, posing more complex issues for network security. This book serves well as an overview of the subject for library managers or library IT personnel; Connolly provides sources for additional reading and guidance for those wishing to delve further into a particular subject.

Summing Up: Highly recommended. Graduate students and all library professionals. * CHOICE * Matthew Connolly's book not only describes not only why privacy matters but also gives easy-to-follow steps for protecting user privacy in all types of libraries. I implemented a few of the suggestions on my own devices. This book is recommended for all libraries and librarians. -- Emily J. M. Knox, assistant professor, School of Information Sciences, University of Illinois at Urbana-Champaign

List of Figures
ix
List of Textboxes
xi
Preface xiii
Chapter 1 The Privacy Landscape
1(12)
Chapter 2 Policy and Privacy
13(18)
Chapter 3 Networks and Infrastructure
31(18)
Chapter 4 Public Computers
49(20)
Chapter 5 Web Browsers and Websites
69(20)
Chapter 6 Mobile Devices
89(18)
Chapter 7 Apps
107(18)
Chapter 8 The Cloud
125(18)
Chapter 9 Tor, Privacy Outreach, and the Future of Privacy
143(16)
Index 159(6)
About the Author 165
Matthew Connolly is an application and web programmer at Cornell University Library, where he has worked for more than ten years on a variety of library services and tools for the public and library staff. He holds a Master of Engineering degree from Cornell, specializing in systems engineering. He has published articles in both popular and peer-reviewed journals and co-authored Using iPhones, iPads, and iPods: A Practical Guide for Librarians.