Library Security

Library Security

Author: Steve Albrecht

Publisher: American Library Association

Published: 2015-05-27

Total Pages: 231

ISBN-13: 083891330X

DOWNLOAD EBOOK

Library work is really all about people. And the inclusive, welcoming nature of the library means that all kinds of people pass through its doors. Not all difficult patrons are dangerous, but some frighten staff and other library users, which can lead to situations that are distracting, troubling, and fraught with liability. For more than a decade, Albrecht, a 15-year police veteran, has presented workshops for libraries on dealing with challenging patrons. His no-nonsense advice will empower library staff in their personal security and give them the tools to confidently communicate with their colleagues, patrons, and members of law enforcement regarding inappropriate behavior. In this book he addresses security issues important to all libraries, including Specific guidance for common situations, such as unruly teens, unwanted sexual advances, chronically homeless substance abusers, and moreThe elements of an effective Code of Conduct and how to enforce itTips on how to manage internet usage to minimize potential problemsHow to align with patrons and use language that defuses the conflictForming partnerships with service organizations, homeless shelters, mental health advocacy groups, and other community resourcesHow to know when it’s time to call the police, plus ideas for increasing law enforcement supportWays to make the library more secure through changes to facilitiesThrough the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.


Linux Security

Linux Security

Author: Ramón J. Hontañón

Publisher: John Wiley & Sons

Published: 2006-02-20

Total Pages: 511

ISBN-13: 0782153275

DOWNLOAD EBOOK

Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail†so you stay on track and accomplish all your goals. Coverage includes: Understanding information and system security procedures Developing a corporate security policy Designing and deploying an effective system and network monitoring strategy Managing the network services offered by Linux servers Understanding Sendmail security, including authentication and privacy Providing application-level mail security using PGP Designing and deploying an Apache HTTP server, including SSL extensions Securing your Samba server Building a network layer firewall using IPtables and Linux kernel v.2.4 Using the NEC SOCKS5 transport layer firewall Deploying the TIS firewall toolkit Offering secure remote connectivity with IPsec and PPTP VPNs Adding strong user authentication to Linux servers using Kerberos Understanding the Linux Pluggable Authentication Modules (PAM)


Security Information and Event Management (SIEM) Implementation

Security Information and Event Management (SIEM) Implementation

Author: David R. Miller

Publisher: McGraw Hill Professional

Published: 2010-11-05

Total Pages: 465

ISBN-13: 0071701087

DOWNLOAD EBOOK

Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You’ll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource. Assess your organization’s business models, threat models, and regulatory compliance requirements Determine the necessary SIEM components for small- and medium-size businesses Understand SIEM anatomy—source device, log collection, parsing/normalization of logs, rule engine, log storage, and event monitoring Develop an effective incident response program Use the inherent capabilities of your SIEM system for business intelligence Develop filters and correlated event rules to reduce false-positive alerts Implement AlienVault’s Open Source Security Information Management (OSSIM) Deploy the Cisco Monitoring Analysis and Response System (MARS) Configure and use the Q1 Labs QRadar SIEM system Implement ArcSight Enterprise Security Management (ESM) v4.5 Develop your SIEM security analyst skills


Library Security

Library Security

Author: Dr. Steve Albrecht

Publisher: American Library Association

Published: 2015-05-27

Total Pages: 231

ISBN-13: 0838913555

DOWNLOAD EBOOK

Through the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.


Smart Card Security and Applications, Second Edition

Smart Card Security and Applications, Second Edition

Author: Mike Hendry

Publisher: Artech House

Published: 2001

Total Pages: 324

ISBN-13: 1580531563

DOWNLOAD EBOOK

This extensively updated edition of the popular book offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand-new discussions on multiapplication operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the latest developments in this field.


Museum, Archive, and Library Security

Museum, Archive, and Library Security

Author: Lawrence J. Fennelly

Publisher: Butterworth-Heinemann

Published: 2014-05-12

Total Pages: 908

ISBN-13: 1483221032

DOWNLOAD EBOOK

Museum, Archive, and Library Security provides an introduction to the security programs of museums and other park facilities. This book discusses the mechanism that provides for the protection of information, collections, equipment, personnel, and physical facilities of museums. Organized into seven parts encompassing 30 chapters, this book begins with an overview of the security programs of the National Park Service. This text then examines the quality of security personnel and its proper training, as well as its most efficient utilization and allocation. Other chapters consider the standard instruction in how to implement new security procedures by staff members. This book discusses as well the significance of good security for the protection of fine arts of any nature. The final chapter deals with global concern on the prevention, protection, import, or export of cultural property. This book is a valuable resource for security directors, archivists, curators, maintenance personnel, historic preservation specialists, and librarians.


Robertson on Library Security and Disaster Planning

Robertson on Library Security and Disaster Planning

Author: Guy Robertson

Publisher: Chandos Publishing

Published: 2016-01-29

Total Pages: 239

ISBN-13: 008100088X

DOWNLOAD EBOOK

Robertson on Library Security and Disaster Planning presents a collection of highly-cited, author published articles on security and disaster planning for libraries. The book represents the only place where these articles are compiled, making it a go-to volume for practitioners. It includes topics covering all aspects of preparation and response, along with articles drawn from library journals, including Feliciter, Canadian Insurance, Disaster Recovery Journal, and Canadian Bookseller. The book represents a wealth of the author's experience and expertise garnered during a distinguished career working with significant institutions on both their current security problems and their plans for future security. - Offers a unique and valuable collection of the author's articles on library security and disaster planning - Accompanies, and complements, Disaster Planning for Libraries, a second title by the author - Presents a range of security and disaster planning topics in an accessible, narrative style - Represents the only resource that contains such a broad range of security and disaster planning topics


National Security and United States Policy Toward Latin America

National Security and United States Policy Toward Latin America

Author: Lars Schoultz

Publisher: Princeton University Press

Published: 2014-07-14

Total Pages: 399

ISBN-13: 1400858496

DOWNLOAD EBOOK

Lars Schoultz proposes a way for all those interested in U.S. foreign policy fully to appreciate the terms of the present debate. To understand U.S. policy in Latin America, he contends, one must critically examine the deeply held beliefs of U.S. policy makers about what Latin America means to U.S. national security. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.