![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
Apple Inc. has sold more than 500 million iPhones, iPads, and iPodTouches. Library patrons are increasingly coming to libraries with the expectation that their Apple devices will work flawlessly with library services -- or that they can find an iPad to use at the library if they don t have one of their own. Libraries and librarians today are expected to be adept with the latest technology and to be able to apply it to popular use as well as scholarly research. Using iPhones and iPads: A Practical Guide for Librarians offers library professionals a clear path to Apple readiness. The authors, a librarian and a software developer at a prominent research library, combine their experience in library public services and mobile technology to provide easy-to-follow, step-by-step instructions to help you get up to speed on: .Ensuring that your library website and online resources are iDevice-friendly .Creating a custom app for your library and making it available in iTunes .Starting an iPad lending program .Using iDevices for librarianship and library work .Assessing and advertising iDevice programs .Acquiring, configuring, and deploying iDevices to users .Recommended apps that can help you and your users Whether you work at a large academic institution or a small public library, this book will show you how to become iDevice-literate quickly and easily."
Personal data in the online world has become a commodity. Coveted by criminals, demanded by governments, and used for unsavory purposes by marketers and advertisers, your private information is at risk everywhere. For libraries and librarians, this poses a professional threat as well as a personal one. How can we protect the privacy of library patrons and users who browse our online catalogs, borrow sensitive materials, and use our public computers and networks? User Privacy: A Practical Guide for Librarians answers that question. Through simple explanations and detailed, step-by-step guides, library professionals will learn how to strengthen privacy protections for: *Library policies *Wired and wireless networks *Public computers *Web browsers *Mobile devices *Apps *Cloud computing Each chapter begins with a "threat assessment" that provides an overview of the biggest security risks - and the steps that can be taken to deal with them. Also covered are techniques for preserving online anonymity, protecting activists and at-risk groups, and the current state of data encryption.
|
![]() ![]() You may like...
CITIZENSHIP AND DEMOCRATIC CONTROL IN…
Barbara Einhorn, Mary Kaldor, …
Hardcover
R3,275
Discovery Miles 32 750
Prosperity's Predicament - Identity…
Isabel Brown Crook, Christina Kelley Gilmartin
Hardcover
R3,097
Discovery Miles 30 970
Mentored to Perfection - The Masculine…
Simone Dennis, Alison Behie
Hardcover
R2,151
Discovery Miles 21 510
Migration And Mobility In Britain Since…
Colin Pooley, Jean Turnbull
Hardcover
R5,642
Discovery Miles 56 420
The Politics Of Custom - Chiefship…
John L. Comaroff, Jean Comaroff
Paperback
|