logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Protecting Patron Privacy Safe Practices For Public Computers Matthew Beckstrom

  • SKU: BELL-46412136
Protecting Patron Privacy Safe Practices For Public Computers Matthew Beckstrom
$ 31.00 $ 45.00 (-31%)

5.0

78 reviews

Protecting Patron Privacy Safe Practices For Public Computers Matthew Beckstrom instant download after payment.

Publisher: ABC-CLIO
File Extension: EPUB
File size: 4 MB
Author: Matthew Beckstrom
ISBN: 9781610699976, 9781610699969, 1610699971, 1610699963
Language: English
Year: 2015

Product desciption

Protecting Patron Privacy Safe Practices For Public Computers Matthew Beckstrom by Matthew Beckstrom 9781610699976, 9781610699969, 1610699971, 1610699963 instant download after payment.

In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.

Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

Related Products