Narrow your search
Listing 1 - 3 of 3
Sort by

Multi
Access and identity management for libraries : controlling access to online information
Authors: --- ---
ISBN: 1856045889 9781856045889 1306694337 1783300000 9781783300006 Year: 2014 Publisher: London : Facet Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides practical guidance to ensuring that your users can access and personalise the online resources they are entitled to use with the minimum of fuss. With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: what is access management and why do libraries do it?; electronic resources: public and not so public; principles and definitions of identity and access management; current access management technologies; authentication technologies; authorization based on physical location; authorization based on user identity or affiliation; federated access: history, current position and future developments; internet access provided by (or in) libraries; library statistics; the business case for libraries. This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.


Book
Penetration tester's open source toolkit
Author:
ISBN: 1283164442 9786613164445 1597496286 1597496278 9781597496278 9781283164443 9781597496285 Year: 2011 Publisher: Waltham, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester"--


Book
Privacy and Anonymity in Information Management Systems : New Techniques for New Practical Problems
Authors: ---
ISBN: 1849962375 9786612925870 1282925873 1849962383 Year: 2010 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The development of information technologies in the last few years has been remarkable. Large amounts of data are collected and stored by both public institutions and private companies every day. There are clear threats to the privacy of citizens if no care is taken when collecting, storing and disseminating data. Ensuring privacy for individuals in a society when dealing with digital information, is a task which involves many agents, including politicians, legal authorities, managers, developers, and system administrators. Privacy and Anonymity in Information Management Systems deals with the more technical parts of this `privacy cycle', those issues that are mostly related to computer science, and discusses the process by which different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions. The book is written in such a way that several of the chapters are self-contained and accessible to students, covering topics such as the problem of Statistical Disclosure Control (SDC), i.e. how to modify datasets that contain statistical information before publicly releasing them, and doing so in such a way that the privacy of the confidential original information is preserved; and specific distributed applications involving privacy – how different agents have private inputs but want to cooperate to run some protocol in their own interest, without revealing unnecessary parts of their private inputs. Graduate students and researchers will find this book an excellent resource.

Listing 1 - 3 of 3
Sort by