Creating Cyber Libraries
Title | Creating Cyber Libraries PDF eBook |
Author | Kathleen W. Craver |
Publisher | Bloomsbury Publishing USA |
Pages | 249 |
Release | 2002-05-30 |
Genre | Language Arts & Disciplines |
ISBN | 031301390X |
As prices of traditional library materials increase, and space to house them shrinks, savvy school library media specialists are creating cyber libraries, or school libraries on the Internet. These libraries offer students and their parents 24-hour access and are invaluable for providing up-to-date information in a way traditional materials cannot. This guide outlines the steps library media specialists can take to create a cyber library, provide content and policies for use, and maintain it for maximum efficiency. Craver justifies the need for cyber libraries in the 21st century, and how they can help librarians to meet the standards in Information Power (1998). She explains the different types of cyber libraries available, along with their advantages and disadvantages. She discusses how to construct them using portals or by acquiring fee-based cyber libraries, and what policies should be in place to protect both the school and its students. Also included are instructions for establishing remote access to subscription databases, creating cyber reading rooms, and providing instructional services to student users. Once a cyber library is created, it must be maintained and evaluated to keep it useful and current, and this book provides guidelines to do so. Finally, there is a chapter on promoting the cyber library, so the school community is aware of its features and participates in its growth process. No school library should be without this volume!
Developing Cyber Libraries
Title | Developing Cyber Libraries PDF eBook |
Author | M. Sankara Reddy |
Publisher | Allied Publishers |
Pages | 500 |
Release | 2006 |
Genre | Digital libraries |
ISBN | 9788177649734 |
M. Sankara Reddy, b. 1945, librarian from Andhra Pradesh, India; contributed articles.
Building Open Source Network Security Tools
Title | Building Open Source Network Security Tools PDF eBook |
Author | Mike Schiffman |
Publisher | Wiley |
Pages | 452 |
Release | 2002-10-28 |
Genre | Computers |
ISBN | 9780471205449 |
Learn how to protect your network with this guide to building complete and fully functional network security tools Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area—whether it's additional functionality, a specific feature, or a narrower scope. Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own network security tools that meet the needs of your company. To accomplish this, you'll first learn about the Network Security Tool Paradigm in addition to currently available components including libpcap, libnet, libnids, libsf, libdnet, and OpenSSL. Schiffman offers a detailed discussion of these components, helping you gain a better understanding of the native datatypes and exported functions. Next, you'll find several key techniques that are built from the components as well as easy-to-parse programming examples. The book then ties the model, code, and concepts together, explaining how you can use this information to craft intricate and robust security programs. Schiffman provides you with cost-effective, time-saving guidance on how to build customized network security tools using existing components. He explores: A multilayered model for describing network security tools The ins and outs of several specific security-related components How to combine these components into several useful network security techniques Four different classifications for network security tools: passive reconnaissance, active reconnaissance, attack and penetration, and defensive How to combine techniques to build customized network security tools The companion Web site contains all of the code from the book.
Essential Cybersecurity Science
Title | Essential Cybersecurity Science PDF eBook |
Author | Josiah Dykstra |
Publisher | "O'Reilly Media, Inc." |
Pages | 190 |
Release | 2015-12-08 |
Genre | Computers |
ISBN | 1491921072 |
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments. Learn the steps necessary to conduct scientific experiments in cybersecurity Explore fuzzing to test how your software handles various inputs Measure the performance of the Snort intrusion detection system Locate malicious “needles in a haystack” in your network and IT environment Evaluate cryptography design and application in IoT products Conduct an experiment to identify relationships between similar malware binaries Understand system-level security requirements for enterprise networks and web services
Lifelong Learning in Public Libraries
Title | Lifelong Learning in Public Libraries PDF eBook |
Author | Donna L. Gilton |
Publisher | Scarecrow Press |
Pages | 253 |
Release | 2012 |
Genre | Language Arts & Disciplines |
ISBN | 0810883562 |
Lifelong Learning in Public Libraries demonstrates that public librarians can promote learning by combining the elements of Information Literacy Instruction (ILI) with traditional practices of public libraries. This approach contributes to the information enfranchisement of patrons and enhances the fulfillment of the traditional goals and purposes of libraries. Donna L. Gilton provides background on ILI and current developments in public library instruction and also examines educational theories and practices derived from the fields of behaviorism, cognitive psychology, constructivism, and educational humanism. Additional chapters delve into practices developed to deal with diverse groups and translate the theories and practices that have been outlined into a well-coordinated plan. The final chapters survey the role of libraries as cultural institutions. This book introduces the field of ILI to public librarians in the context of their own traditions and shows the unique ways that ILI can be implemented in public library settings. It encourages librarians to rethink practices to incorporate the principles of ILI and will enable public librarians to extend and enrich their instruction on information use. Lifelong Learning in Public Libraries is a valuable resource for librarians, educators, and leaders of public organizations.
Practical Cybersecurity Architecture
Title | Practical Cybersecurity Architecture PDF eBook |
Author | Ed Moyle |
Publisher | Packt Publishing Ltd |
Pages | 418 |
Release | 2020-11-20 |
Genre | Computers |
ISBN | 1838982191 |
Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop Key Features Leverage practical use cases to successfully architect complex security structures Learn risk assessment methodologies for the cloud, networks, and connected devices Understand cybersecurity architecture to implement effective solutions in medium-to-large enterprises Book DescriptionCybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.What you will learn Explore ways to create your own architectures and analyze those from others Understand strategies for creating architectures for environments and applications Discover approaches to documentation using repeatable approaches and tools Delve into communication techniques for designs, goals, and requirements Focus on implementation strategies for designs that help reduce risk Become well-versed with methods to apply architectural discipline to your organization Who this book is for If you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you’re new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further.
School Libraries in a Time of Change
Title | School Libraries in a Time of Change PDF eBook |
Author | Kathleen W. Craver |
Publisher | Bloomsbury Publishing USA |
Pages | 257 |
Release | 2019-08-01 |
Genre | Language Arts & Disciplines |
ISBN | 1440873097 |
By becoming practical futurists, school librarians can help their libraries not only to survive sweeping changes in education but to thrive. This book shows how to spot technological trends and use them to your library's advantage. During this time of rapid modernization of technology and educational reform, this book is a must-read for school librarians tasked with ensuring their libraries meet evolving standards. This title provides the research and organizational techniques and skills they need to gain seats at the table of the three power committees: technology, curricula, and strategic planning. School librarians need to collect and publicize national and local school-based evidence that shows the positive correlations between school librarians and student achievement. Craver notes correlative sources and provides ideas to employ them to ensure that school librarians remain indispensable. In addition, acquiring technological skills and becoming expert at their application are paramount for librarians. Even more important is the need for librarians to assume sole responsibility for designing and integrating information literacy and critical thinking skills throughout the curriculum. Craver analyzes studies that show students' inability to discern fact from fiction, ads from news, and information bias in electronic information sources and recommends six actions that school librarians take to ensure that they become active participants in their future rather than its victims.