![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
Apple Inc. has sold more than 500 million iPhones, iPads, and iPodTouches. Library patrons are increasingly coming to libraries with the expectation that their Apple devices will work flawlessly with library services -- or that they can find an iPad to use at the library if they don t have one of their own. Libraries and librarians today are expected to be adept with the latest technology and to be able to apply it to popular use as well as scholarly research. Using iPhones and iPads: A Practical Guide for Librarians offers library professionals a clear path to Apple readiness. The authors, a librarian and a software developer at a prominent research library, combine their experience in library public services and mobile technology to provide easy-to-follow, step-by-step instructions to help you get up to speed on: .Ensuring that your library website and online resources are iDevice-friendly .Creating a custom app for your library and making it available in iTunes .Starting an iPad lending program .Using iDevices for librarianship and library work .Assessing and advertising iDevice programs .Acquiring, configuring, and deploying iDevices to users .Recommended apps that can help you and your users Whether you work at a large academic institution or a small public library, this book will show you how to become iDevice-literate quickly and easily."
Personal data in the online world has become a commodity. Coveted by criminals, demanded by governments, and used for unsavory purposes by marketers and advertisers, your private information is at risk everywhere. For libraries and librarians, this poses a professional threat as well as a personal one. How can we protect the privacy of library patrons and users who browse our online catalogs, borrow sensitive materials, and use our public computers and networks? User Privacy: A Practical Guide for Librarians answers that question. Through simple explanations and detailed, step-by-step guides, library professionals will learn how to strengthen privacy protections for: *Library policies *Wired and wireless networks *Public computers *Web browsers *Mobile devices *Apps *Cloud computing Each chapter begins with a "threat assessment" that provides an overview of the biggest security risks - and the steps that can be taken to deal with them. Also covered are techniques for preserving online anonymity, protecting activists and at-risk groups, and the current state of data encryption.
|
![]() ![]() You may like...
Think Risk - A Practical Guide to…
Shital Thekdi, Terje Aven
Paperback
R1,395
Discovery Miles 13 950
Money Lies And God - Inside The Movement…
Katherine Stewart
Hardcover
|