Through simple explanations and step-by-step guides, library professionals will learn how to strengthen privacy protections for: Library policiesWired and wireless networksPublic computersWeb browsersMobile devicesAppsCloud computing
Each chapter provides an overview of the security risks and the respective preventative steps.