


Library Manager
Library Manager
Library Manager
Easy library access for students & staff
Easy library access for students & staff
Easy library access for students & staff
DURATION
DURATION
1 Month (2020)
1 Month (2020)
1 Month (2020)
ROLE
ROLE
UX Designer
UX Designer
UX Designer
|
|
Front-End Developer
Front-End Developer
Front-End Developer
PLATFORM
PLATFORM
Desktop
Desktop
Desktop
Understanding the Project
Understanding the Project
Understanding the Project
About
About
About
Our Secure Web Development course centers on designing applications with defense against disruptive threats to its users and services.
Our Secure Web Development course centers on designing applications with defense against disruptive threats to its users and services.
Our Secure Web Development course centers on designing applications with defense against disruptive threats to its users and services.
Design Challenge
Design Challenge
Design Challenge
We were tasked to transition a manual school library system to an online platform, prioritizing security and user access to deliver a robust and protected user experience.
We were tasked to transition a manual school library system to an online platform, prioritizing security and user access to deliver a robust and protected user experience.
We were tasked to transition a manual school library system to an online platform, prioritizing security and user access to deliver a robust and protected user experience.
Research
Research
Research
Though project requirements were provided, we had the flexibility to determine how to approach and implement the solution. To guide our process, we explored established online library and admin systems. Sites like the Richmond Public Library, Chicago Public Library, and Majestic Admin helped us refine our ideas.
Though project requirements were provided, we had the flexibility to determine how to approach and implement the solution. To guide our process, we explored established online library and admin systems. Sites like the Richmond Public Library, Chicago Public Library, and Majestic Admin helped us refine our ideas.
Though project requirements were provided, we had the flexibility to determine how to approach and implement the solution. To guide our process, we explored established online library and admin systems. Sites like the Richmond Public Library, Chicago Public Library, and Majestic Admin helped us refine our ideas.
Defining User Access
Defining User Access
Defining User Access
Building on our research, we focused on integrating user access management to ensure the site's security. This involved safeguarding sensitive information and preventing unauthorized access by clearly defining user roles and permissions.
The system accommodates four user types—guest, students & teachers, admin, and book manager—each with specific access levels and functionalities.
Building on our research, we focused on integrating user access management to ensure the site's security. This involved safeguarding sensitive information and preventing unauthorized access by clearly defining user roles and permissions.
The system accommodates four user types—guest, students & teachers, admin, and book manager—each with specific access levels and functionalities.
Building on our research, we focused on integrating user access management to ensure the site's security. This involved safeguarding sensitive information and preventing unauthorized access by clearly defining user roles and permissions.
The system accommodates four user types—guest, students & teachers, admin, and book manager—each with specific access levels and functionalities.
Filler
View Books
Search Books
Borrow Books
Review Books
Manage Books
Manage Users
Guest
Student
|
Teacher
Admin
Book Manager



System Architecture
System Architecture
System Architecture
After establishing user access controls, we organized actions and features into specific pages to gain a clear understanding of what to build and how the system should function for each user type. Users were grouped similar access levels.
After establishing user access controls, we organized actions and features into specific pages to gain a clear understanding of what to build and how the system should function for each user type. Users were grouped similar access levels.
After establishing user access controls, we organized actions and features into specific pages to gain a clear understanding of what to build and how the system should function for each user type. Users were grouped similar access levels.



Solution
Solution
Solution
An online library that enables guests and school staff to easily browse, borrow, and review books, while offering admins and managers streamlined tools to manage content and users, all within a protected, access-controlled environment.
An online library that enables guests and school staff to easily browse, borrow, and review books, while offering admins and managers streamlined tools to manage content and users, all within a protected, access-controlled environment.
An online library that enables guests and school staff to easily browse, borrow, and review books, while offering admins and managers streamlined tools to manage content and users, all within a protected, access-controlled environment.
Search











Outlive
Peter Attia, MD
Hover over a book
Accessible Tools
Accessible Tools
Accessible Tools
Browse books with readily available online library services, reducing reliance on manual processes.
Browse books with readily available online library services, reducing reliance on manual processes.
Browse books with readily available online library services, reducing reliance on manual processes.
•••••••••••
Weak
OK
Good
Strong
Weak
OK
Good
Strong
Weak
OK
Good
Strong
Weak
OK
Good
Strong
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
At least 8 char.
At least 1 uppercase
At least 1 number
At least 1 special char.
Secure Data Handling
Secure Data Handling
Secure Data Handling
Employs input validation, encryption, and audits to safeguard sensitive information and ensure data integrity.
Employs input validation, encryption, and audits to safeguard sensitive information and ensure data integrity.
Employs input validation, encryption, and audits to safeguard sensitive information and ensure data integrity.
Datetime
By
Log Entry
04/13/2020 - 3:32 am
jadetan
Attempted login
04/13/2020 - 3:33 am
jadetan
Attempted login
05/01/2020 - 5:29 pm
admin
Changed “ritawong” - ID
07/31/2020 - 10:58 pm
manager
Changed “0bjs-iqqn” - Status
ACCOUNT MANAGEMENT
Users
Managers
SYSTEM MANAGEMENT
System Logs
Access Logs
Access Attempts






Efficient Management
Efficient Management
Efficient Management
Equips admins with tools for streamlined library content and user access management.
Equips admins with tools for streamlined library content and user access management.
Equips admins with tools for streamlined library content and user access management.