Securing Library Technology

Securing Library Technology

A How-to-do-it Manual

Book - 2009
Rate this:
A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan. The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide.
Publisher: New York : Neal-Schuman Publishers, c2009.
ISBN: 9781555706395
1555706398
Branch Call Number: 005.8 Earp
Characteristics: xiv, 245 p. :,ill. ;,28 cm.
Additional Contributors: Wright, Adam 1970-

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Recommendations

Subject Headings

  Loading...
No similar edition of this title was found at JoCoLibrary.

Try searching for Securing Library Technology to see if JoCoLibrary owns related versions of the work.


  Loading...
[]
[]
To Top