Description
Book Synopsis: Systems administrators, librarians, and library staff will learn key principles and methods for securing their ILS and understand how to configure and optimize their library catalog by improving data management practices, streamlining existing workflows, and documenting their system's configuration.
The integrated library system (ILS) plays a central role in every library's operations, but is your ILS optimized to ensure maximum productivity? Are you taking advantage of the features added since you implemented it? Walking readers through a wide-ranging ILS review, this book will help you ensure systems are properly configured, produce better documentation, and evaluate staff workflows.
The authors-a director of collections and content and a director of user experience-created a comprehensive plan for reviewing an ILS, starting with planning the project and deciding whom to include. They discuss basic ILS security principles, including keeping patron data safe and the importance of reviewing staff permissions. After the basics, the authors go in-depth on reviewing codes and figuring out how different parts of an ILS work together as well as how to review those areas, and they offer ideas on how to stay up-to-date with your ILS, such as where to look for information on issues, updates, and new features. Several methods for analyzing and documenting workflows are also discussed.
Details
reyugeghemsufyurbrrysysem?Wh"MkgheMsfYurS:User'sGudeEvugdpmzgbrrySysems,"yuukheruepefyuregredbrrysysem(S).Wheheryu'resysemsdmsrr,brr,rbrrysffmember,hsbkwehyukeyprpesdmehdsfrseurgyurSdpmzgyurbrryg.ywyumprveyurdmgemepresdsremewrkfws,buyu'serhwdumeyursysem'sfgurfrmxmumprduvy.
WhyseefrsubprSwheyuhveehmeesyureeds?urbkkesyuhrughmprehesverevewpress,esurghyurSsprperyfgureddfuyuzed.Whhegudefuruhrs-drerfesde,ddrerfuserexperee-yu'erhwevuesffwrkfws,revewdes,dudersdhwdffereprsfyurSwrkgeher.hskwedgewempweryumkefrmeddessdkedvgefheesfeuresdupdes.
Keepgprdsfespprry,d"MkgheMsfYurS"versesseseuryprpes.Yu'dsverhemprefrevewgsffpermsssdmpemegmesurespresesvefrm.ddy,weprvdevubesghshwsyup--dewhyurS,udgwherefdfrmssues,updes,dewfeures.Sygdbyeudedpresdembremreeffedseurebrrysysem.
D'mssuheppruypmzeyurSdeheyurbrry'spers.rder"MkgheMsfYurS:User'sGudeEvugdpmzgbrrySysems"dydembrkjureymxmzeyurbrry'spe.
Discover More Best Sellers in Networking & Cloud Computing
Shop Networking & Cloud Computing
The Official (ISC)2 CISSP CBK Reference (Cissp: Certified Information Systems Security Professional)
Networking & Cloud Computing - The Official (ISC)2 CISSP CBK Reference (Cissp: Certified Information Systems Security Professional)
CompTIA Security+ Certification Kit: Exam SY0-601
Networking & Cloud Computing - CompTIA Security+ Certification Kit: Exam SY0-601
CompTIA A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
Networking & Cloud Computing - CompTIA A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
Windows 11 All-in-One For Dummies, 2nd Edition
Networking & Cloud Computing - Windows 11 All-in-One For Dummies, 2nd Edition
Hackers & Painters: Big Ideas from the Computer Age
Networking & Cloud Computing - Hackers & Painters: Big Ideas from the Computer Age
Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and Shell Programming
Networking & Cloud Computing - Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and Shell Programming
Networking & Cloud Computing - Terraform Cookbook: Provision, run, and scale cloud architecture with real-world examples using Terraform
Networking & Cloud Computing - Salesforce AppExchange Success Blueprint: Transform your ideas into profitable and scalable Salesforce applications
CompTIA Security+ Guide to Network Security Fundamentals (MindTap Course List)
Networking & Cloud Computing - CompTIA Security+ Guide to Network Security Fundamentals (MindTap Course List)

