03845oam 2200661I 450 991046545660332120200520144314.00-203-09621-51-299-27920-11-136-21735-510.4324/9780203096215 (CKB)2560000000099229(EBL)1143733(OCoLC)830161362(SSID)ssj0000833007(PQKBManifestationID)11476937(PQKBTitleCode)TC0000833007(PQKBWorkID)10935630(PQKB)11047828(MiAaPQ)EBC1143733(Au-PeEL)EBL1143733(CaPaEBR)ebr10672672(CaONFJC)MIL459170(OCoLC)839778054(EXLCZ)99256000000009922920180706d2013 uy 0engur|n|---|||||txtccrCyber security for educational leaders a guide to understanding and implementing technology policies /Richard Phillips and Rayton R. SianjinaNew York :Routledge,2013.1 online resource (165 p.)Description based upon print version of record.0-415-63197-1 0-415-63196-3 Includes bibliographical references and index.Cover; Cyber Security for Educational Leaders; Title Page; Copyright Page; Table of Contents; Preface; ELCC Elements and Related Chapters; Matrix ELCC Elements and Related Chapters; Acknowledgments; Chapter 1: Introduction; Chapter 2: Total Cost of Ownership; Chapter 3: Acceptable Use Policy; Chapter 4: Authentication Policy; Chapter 5: Internet-Use Policy; Chapter 6: Access Policy; Chapter 7: Auditing Policy; Chapter 8: Physical Policy; Chapter 9: Analysis Policy; Chapter 10: Privacy Policy; Chapter 11: Cyber Risk Assessment Checklist Profile and QuestionnaireChapter 12: Electronic BullyingChapter 13: Electronic Sexual Harassment; Chapter 14: Basics of Copyright and Fair Use; Glossary; References; Index"As leaders are increasingly implementing technologies into their districts and schools, they need to understand the implications and risks of doing so. Cyber Security for Educational Leaders is a much-needed text on developing, integrating, and understanding technology policies that govern schools and districts. Based on research and best practices, this book discusses the threats associated with technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect their schools and to avoid litigation.Special Features:A Cyber Risk Assessment Checklist and Questionnaire helps leaders measure levels of risk in eight vital areas of technology usage. Case vignettes illuminate issues real leaders have encountered and end-of-chapter questions and activities help readers make connections to their own practice.Chapter alignment with the ELCC standards.An entire chapter on Copyright and Fair Use that prepares leaders for today's online world.A Companion Website with additional activities, assessment rubrics, learning objectives, and PowerPoint slides. "--Provided by publisher.Educational technologySecurity measuresCyberspaceSecurity measuresComputer securityElectronic books.Educational technologySecurity measures.CyberspaceSecurity measures.Computer security.371.33Phillips Richard1958-,847038Sianjina Rayton R.MiAaPQMiAaPQMiAaPQBOOK9910465456603321Cyber security for educational leaders1892212UNINA01589oam 2200529 450 991015325860332120230803194617.01-292-01487-3(CKB)2560000000327412(SSID)ssj0001257269(PQKBManifestationID)12453017(PQKBTitleCode)TC0001257269(PQKBWorkID)11275193(PQKB)11228011(MiAaPQ)EBC5173957(MiAaPQ)EBC5175281(MiAaPQ)EBC5833085(MiAaPQ)EBC6400277(EXLCZ)99256000000032741220210429d2014 uy 0engurcnu||||||||txtccrThe technique of orchestration /Kent Kennan, Donald GranthamSixth, Pearson new international edition.Harlow, England :Pearson,[2014]©20141 online resource (417 pages)Always learningBibliographic Level Mode of Issuance: Monograph1-292-04292-3 Includes bibliographical references and index.Always learning.Instrumentation and orchestrationInstrumentation and orchestration.781.374Kennan Kent1913-2003,1374694Grantham Donald1947-MiAaPQMiAaPQUtOrBLWBOOK9910153258603321The technique of orchestration3408118UNINA