Through simple explanations and step-by-step guides, library professionals will learn how to strengthen privacy protections for:*Library policies*Wired and wireless networks*Public computers*Web browsers*Mobile devices*Apps*Cloud computingEach chapter provides an overview of the security risks and the respective preventative steps.
Through simple explanations and step-by-step guides, library professionals will learn how to strengthen privacy protections for:*Library policies*Wire...