Download Free Library Public Access Workstation Authentication Book in PDF and EPUB Free Download. You can read online Library Public Access Workstation Authentication and write the review.

This unique book explores the use of cryptographic techniques in authentication and key distribution systems. Systems such as Kerberos, NetSP, SPX, TESS, and SESAME are analyzed and compared. Computer scientists, electrical engineers, networking specialists, and information technology professionals learn valuable cryptographic techniques--and why authentication and key distribution systems are likely to become the primary means for securing networks and distributed systems in the future.
A library must function with integrity in order to function well. This book looks at a broad range of library functions through the lens of integrity and ethics. This largely unexplored area of study is handled exceptionally well by the library and information professionals contained in these pages. This book addresses the ethical and integrity issues that may come up in the day to day workings of the library as well considerations for the ethical education of our future librarians. Within a framework based on the ethical issues that are attached with information management, this book examines the impact of the US Patriot Act, library authentication and access management, plagiarism and social networking. This material was published in the Journal of Library Administration.
With The Rapid Increase the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. Managers of online information wish to implement policies about who can access the information and under what terms and conditions but often they need further guidance. Written by experts in the field, this practical book is the first to explain the principles behind access management, the available technologies and how they work. This includes an overview of federated access management technologies, such as Shibboleth, that have gained increasing international recognition in recent years. This book provides detailed case studies describing how access management is being implemented at organizational and national levels in the UK, USA and Europe, and gives a practical guide to the resources available to help plan, implement and operate access management in libraries. Key topics include: What is access management and why do libraries do it? Authorization based on user identity or affiliation Electronic resources: public and not so public Federated access: history, current position and future developments Principles and definitions of identity and access management How to choose access management and identity management products and services Current access management technologies Internet access provided by (or in) libraries Authentication technologies Library statistics Authorization based on physical location The business case for libraries This is essential reading for all who need to understand the principles behind access management or implement a working system in their library.
"Computers have been a major resource in libraries for many years. From the first OPAC terminal to librarian-assisted DIALOG searching, the role of computers in service to library patrons has come a long way. Today, library public computers serve many different needs of patrons. Public computers are OPACs; gateways to databases, e-books, e-journals, video and audio content; information resources about the library and its many services; e-mail kiosks; and a destination where patrons find numerous software applications. All of these resources are often loaded on each public computer, and patrons flock to them. These computers are fully networked and often configured for, or attached to, numerous peripherals. This public computing environment presents a wide range of challenges to academic and research library staff and administrators. In an environment that demands more of the resources, the infrastructure, and the staff who work to keep public computing the stable and reliable door to all things digital in the library, how are libraries managing and supporting public computing to meet the needs and expectations of today's library user?" --Publisher's Website