Download e-book for iPad: Access and identity management for libraries : controlling by Masha Garibyan, Simon McLeish, John Paschoud

By Masha Garibyan, Simon McLeish, John Paschoud

ISBN-10: 1783300000

ISBN-13: 9781783300006

ISBN-10: 1856045889

ISBN-13: 9781856045889

With the speedy elevate within the use of digital assets in libraries, handling entry to on-line info is a space many librarians fight with. This useful ebook is the 1st to give an explanation for the foundations in the back of entry administration, the on hand applied sciences and the way they paintings. It presents special case stories describing how entry administration is being applied at organizational and nationwide degrees within the united states and Europe, and serves as a pragmatic advisor to the assets on hand to aid plan, enforce and function entry administration in libraries

Show description

Read Online or Download Access and identity management for libraries : controlling access to online information PDF

Similar library management books

Get Building a Buzz: Libraries and Word-of-mouth Marketing PDF

Are looking to get the note out approximately your library within the cheapest approach attainable? you could do so with the potent word-of-mouth advertising (WOMM) innovations specified by this e-book. inventive retailers, Peggy Barber and Linda Wallace, deliver you sound advertising and marketing rules to unfold the observe approximately your library in the group with: a technique that works for you, WOMM must-haves, how to successfully bring your message, and most sensible practices and insightful stories.

Download e-book for iPad: Information History–An Introduction. Exploring an Emergent by Toni Weller

It is a pioneering advent to the emergent box of knowledge background. It explores how the modern values and issues of our personal info society have helped result in a reconsideration of our historical past, and of what constitutes our historic realizing of knowledge within the twenty-first century.

Get In search of knowledge management : pursuing primary PDF

Written through highly-respected practitioners and students ''In seek of data administration: Pursuing fundamental Principles'' bargains learn and perform insights into the rising self-discipline and box of information administration and goals to speed up an international adoption of data administration (KM) as a unique and demanding box of analysis for cutting-edge pros.

Read e-book online Dynamic Optimization. Deterministic and Stochastic Models PDF

This e-book explores discrete-time dynamic optimization and offers a close creation to either deterministic and stochastic versions. masking issues of finite and limitless horizon, in addition to Markov renewal courses, Bayesian regulate versions and in part observable procedures, the e-book specializes in the fitting modelling of purposes in various parts, together with operations examine, machine technology, arithmetic, facts, engineering, economics and finance.

Additional info for Access and identity management for libraries : controlling access to online information

Example text

Some commercial ERMs are tied to additional services provided by that company. Maria Collins has produced two excellent articles (2005, 2008) that give a detailed overview of some of the commercial ERMs available today and selection criteria for choosing an ERM. The commercial systems design is largely based on the ERM requirements established by the Digital Library Federation’s Electronic Management Initiative (Digital Library Federation, 2004). While the DLF guidelines have given invaluable assistance to commercial ERM developers, it is still important to evaluate each potential ERM very carefully to make sure it fits closely with the local requirements.

Fairly easy to use; easy Very hard for publishers for institutions to to manage properly; manage; allows likely to be used personalized services; insecurely; difficult to allows granular levels of allow access to some access down to individual subgroups of users but user. not to others. Integrates with existing Can be hard to set up; user/resource users can find federated management processes; access confusing. allows personalized services; can allow anonymity and enhance privacy; allows granular levels of access down to individual user and including groups of users; secure.

How this can be done is explained in more detail in Chapter 5. On registration, a default password may be issued which the user must change before any further use. Authentication When a (registered) user attempts to access a protected online resource, they will often be faced with an ‘authentication challenge’. Authentication is the process in which a user presents credentials of some sort to prove ‘they are who they say they are’. There are many different kinds of credentials which can be used; anything which belongs to the user and not shared with anyone who is not permitted to access the protected resource is usable; usernames and passwords in combination are a commonly used example.

Download PDF sample

Access and identity management for libraries : controlling access to online information by Masha Garibyan, Simon McLeish, John Paschoud


by Charles
4.3

Rated 4.27 of 5 – based on 19 votes