Muutke küpsiste eelistusi

E-raamat: Protecting Patron Privacy: Safe Practices for Public Computers

(Lewis & Clark Library, Helena, MT, USA), Foreword by , Foreword by
  • Formaat: 118 pages
  • Ilmumisaeg: 11-Jun-2015
  • Kirjastus: Libraries Unlimited Inc
  • Keel: eng
  • ISBN-13: 9781610699976
  • Formaat - EPUB+DRM
  • Hind: 49,13 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 118 pages
  • Ilmumisaeg: 11-Jun-2015
  • Kirjastus: Libraries Unlimited Inc
  • Keel: eng
  • ISBN-13: 9781610699976

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.

In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct researchif you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.

Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

Arvustused

Librarians teaching the Internet to patrons, or managing public workstations, will find this a solid introduction to privacy concerns. * Technical Services Quarterly *

Muu info

Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.
Foreword xi
1 Privacy and How It Is Lost
1(16)
Privacy
1(1)
Libraries and Privacy
1(3)
Privacy on the Internet
4(1)
How Is Privacy Lost on the Internet?
5(1)
IP Address
5(1)
Client Information
6(1)
Cookies
7(2)
Beacons
9(1)
Scripts/Social Networks
9(1)
Public Computers
10(1)
Search Engines
10(1)
Fingerprinting
11(1)
Viruses and Spyware
12(5)
2 Staff Procedures and Policy
17(14)
Staff Procedures and Policy
17(1)
Staff Procedures
17(1)
Patron Usage Logs
17(3)
Clearing Computer Records
20(1)
Configuring Internet Explorer
21(1)
Configuring Firefox
22(2)
Provide Safe Locations for Computers
24(1)
Privacy Audits
25(1)
Library Policies
26(5)
3 Patron Education
31(16)
Patron Education
31(1)
Password Security
32(2)
Secure Browsing
34(1)
Account Settings
35(1)
Account Logins on Public Computers
36(4)
Location Verification
40(1)
Antivirus Applications
40(2)
Search Behavior
42(1)
StartPage
43(1)
DuckDuckGo
44(1)
Other Search Engines
44(3)
4 Network Security and Devices
47(8)
Network Security and Devices
47(1)
Network Design
47(1)
Routers
47(2)
Configuring NAT
49(1)
Subnetting
49(1)
Firewalls
50(1)
How Does a Firewall Protect Privacy?
51(1)
Wireless Access Points
52(3)
5 Windows Settings and Applications
55(28)
Windows Settings and Applications
55(1)
Windows Policies
55(3)
Internet Explorer Options
58(1)
Chrome Options
58(1)
Windows Applications
59(1)
Deep Freeze
59(2)
Disk Cleanup
61(2)
CCleaner
63(8)
Proxies and The Onion Router (Tor)
71(2)
Using Tor
73(1)
Antivirus and Spyware Applications
74(1)
Microsoft Security Essentials
75(2)
Windows Defender
77(1)
AVG
77(6)
6 Browser Settings and Plug-Ins
83(20)
Browser Settings
83(1)
Privacy Mode
84(1)
Internet Explorer InPrivate Mode
84(1)
Firefox Private Browsing
85(1)
Chrome Incognito Mode
86(1)
Do Not Track
87(2)
Browser Plug-Ins
89(1)
Installing Plug-Ins
89(1)
Internet Explorer
89(1)
Firefox
90(1)
Chrome
90(1)
Plug-Ins or Extensions for Public Computers
91(1)
Disconnect.me
92(2)
Adblock Plus
94(1)
NoScript
95(2)
ScriptSafe
97(1)
HTTPS Everywhere
97(1)
ZenMate
98(1)
Blur
99(1)
Lightbeam
100(3)
Index 103
Matthew Beckstrom is a systems manager at Lewis & Clark Library, Helena, MT, and a frequent presenter at conferences on library technology and privacy.