Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it?; electronic resources: public and not so public; principles and definitions of identity and access management; current access management technologies; authentication technologies; authorization based on physical location; authorization based on user identity or affiliation; federated access: history, current position and future developments; internet access provided by (or in) libraries; library statistics; the business case for libraries. This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.
Electronic information resources --- Library administration. --- Collection management (Libraries) --- Sources d'information électroniques --- Bibliothèques --- Gestion des collections (Bibliothèques) --- Access control --- Accès --- Contrôle --- Administration --- Library administration --- Library automation --- Computer architecture. Operating systems --- -Collection management (Libraries) --- 025.344 --- Libraries --- Library management --- Management --- Collections management (Libraries) --- Library collection management --- Technical services (Libraries) --- Digital information resources --- Digital resources (Information resources) --- Electronic information sources --- Electronic resources (Information resources) --- Information resources --- Organization --- Collection management --- Sources d'information électroniques --- Bibliothèques --- Gestion des collections (Bibliothèques) --- Accès --- Contrôle --- Computer security --- Access control. --- Electronic information resources - Access control
Choose an application
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester"--
Computer hackers. --- Computer networks - Security measures - Testing. --- Computer networks -- Security measures. --- Computer security. --- Computers - Access control. --- Electronic information resources -- Access control. --- Penetration testing (Computer security). --- Engineering & Applied Sciences --- Computer Science --- Computers --- Penetration testing (Computer security) --- Computer networks --- Access control. --- Security measures --- Testing. --- Information Technology --- General and Others --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Ethical hacking (Computer security) --- Computer security --- Distributed processing
Choose an application
The development of information technologies in the last few years has been remarkable. Large amounts of data are collected and stored by both public institutions and private companies every day. There are clear threats to the privacy of citizens if no care is taken when collecting, storing and disseminating data. Ensuring privacy for individuals in a society when dealing with digital information, is a task which involves many agents, including politicians, legal authorities, managers, developers, and system administrators. Privacy and Anonymity in Information Management Systems deals with the more technical parts of this `privacy cycle', those issues that are mostly related to computer science, and discusses the process by which different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions. The book is written in such a way that several of the chapters are self-contained and accessible to students, covering topics such as the problem of Statistical Disclosure Control (SDC), i.e. how to modify datasets that contain statistical information before publicly releasing them, and doing so in such a way that the privacy of the confidential original information is preserved; and specific distributed applications involving privacy – how different agents have private inputs but want to cooperate to run some protocol in their own interest, without revealing unnecessary parts of their private inputs. Graduate students and researchers will find this book an excellent resource.
Data protection. --- Electronic information resources -- Access control. --- Privacy, Right of. --- Computer security --- Data protection --- Electronic information resources --- Privacy, Right of --- Computer Science --- Engineering & Applied Sciences --- Access control --- Access control. --- Invasion of privacy --- Right of privacy --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Law and legislation --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Electronic data processing
Listing 1 - 3 of 3 |
Sort by
|