9781555706395-1555706398-Securing Library Technology (How-to-do-it Manuals, 162)

Securing Library Technology (How-to-do-it Manuals, 162)

ISBN-13: 9781555706395
ISBN-10: 1555706398
Edition: Illustrated
Author: American Library Association
Publication date: 2009
Publisher: ALA Neal-Schuman
Format: Paperback 260 pages
FREE US shipping

Book details

ISBN-13: 9781555706395
ISBN-10: 1555706398
Edition: Illustrated
Author: American Library Association
Publication date: 2009
Publisher: ALA Neal-Schuman
Format: Paperback 260 pages

Summary

Securing Library Technology (How-to-do-it Manuals, 162) (ISBN-13: 9781555706395 and ISBN-10: 1555706398), written by authors American Library Association, was published by ALA Neal-Schuman in 2009. With an overall rating of 4.5 stars, it's a notable title among other books. You can easily purchase or rent Securing Library Technology (How-to-do-it Manuals, 162) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.47.

Description

This is a worst-case survival handbook for protecting your library's valuable technology assets.A must-have preparedness handbook for every library and information center, this non-technical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats - from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats.Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan.The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book