Library Manager

Library Manager

Library Manager

Easy library access for students & staff

Easy library access for students & staff

Easy library access for students & staff

DURATION

DURATION

1 Month (2020)

1 Month (2020)

1 Month (2020)

ROLE

ROLE

UX Designer

UX Designer

UX Designer

|

|

Front-End Developer

Front-End Developer

Front-End Developer

PLATFORM

PLATFORM

Desktop

Desktop

Desktop

Understanding the Project

Understanding the Project

Understanding the Project

About

About

About

Our Secure Web Development course centers on designing applications with defense against disruptive threats to its users and services.

Our Secure Web Development course centers on designing applications with defense against disruptive threats to its users and services.

Our Secure Web Development course centers on designing applications with defense against disruptive threats to its users and services.

Design Challenge

Design Challenge

Design Challenge

We were tasked to transition a manual school library system to an online platform, prioritizing security and user access to deliver a robust and protected user experience.

We were tasked to transition a manual school library system to an online platform, prioritizing security and user access to deliver a robust and protected user experience.

We were tasked to transition a manual school library system to an online platform, prioritizing security and user access to deliver a robust and protected user experience.

Research

Research

Research

Though project requirements were provided, we had the flexibility to determine how to approach and implement the solution. To guide our process, we explored established online library and admin systems. Sites like the Richmond Public Library, Chicago Public Library, and Majestic Admin helped us refine our ideas.

Though project requirements were provided, we had the flexibility to determine how to approach and implement the solution. To guide our process, we explored established online library and admin systems. Sites like the Richmond Public Library, Chicago Public Library, and Majestic Admin helped us refine our ideas.

Though project requirements were provided, we had the flexibility to determine how to approach and implement the solution. To guide our process, we explored established online library and admin systems. Sites like the Richmond Public Library, Chicago Public Library, and Majestic Admin helped us refine our ideas.

Defining User Access

Defining User Access

Defining User Access

Building on our research, we focused on integrating user access management to ensure the site's security. This involved safeguarding sensitive information and preventing unauthorized access by clearly defining user roles and permissions.


The system accommodates four user types—guest, students & teachers, admin, and book manager—each with specific access levels and functionalities.

Building on our research, we focused on integrating user access management to ensure the site's security. This involved safeguarding sensitive information and preventing unauthorized access by clearly defining user roles and permissions.


The system accommodates four user types—guest, students & teachers, admin, and book manager—each with specific access levels and functionalities.

Building on our research, we focused on integrating user access management to ensure the site's security. This involved safeguarding sensitive information and preventing unauthorized access by clearly defining user roles and permissions.


The system accommodates four user types—guest, students & teachers, admin, and book manager—each with specific access levels and functionalities.

Filler

View Books

Search Books

Borrow Books

Review Books

Manage Books

Manage Users

Guest

Student

|

Teacher

Admin

Book Manager

System Architecture

System Architecture

System Architecture

After establishing user access controls, we organized actions and features into specific pages to gain a clear understanding of what to build and how the system should function for each user type. Users were grouped similar access levels.

After establishing user access controls, we organized actions and features into specific pages to gain a clear understanding of what to build and how the system should function for each user type. Users were grouped similar access levels.

After establishing user access controls, we organized actions and features into specific pages to gain a clear understanding of what to build and how the system should function for each user type. Users were grouped similar access levels.

Solution

Solution

Solution

An online library that enables guests and school staff to easily browse, borrow, and review books, while offering admins and managers streamlined tools to manage content and users, all within a protected, access-controlled environment.

An online library that enables guests and school staff to easily browse, borrow, and review books, while offering admins and managers streamlined tools to manage content and users, all within a protected, access-controlled environment.

An online library that enables guests and school staff to easily browse, borrow, and review books, while offering admins and managers streamlined tools to manage content and users, all within a protected, access-controlled environment.

Search

Outlive

Peter Attia, MD

Hover over a book

Accessible Tools

Accessible Tools

Accessible Tools

Browse books with readily available online library services, reducing reliance on manual processes.

Browse books with readily available online library services, reducing reliance on manual processes.

Browse books with readily available online library services, reducing reliance on manual processes.

•••••••••••

  • Weak

  • OK

  • Good

  • Strong

  • At least 8 char.

    At least 1 uppercase

    At least 1 number

    At least 1 special char.

  • At least 8 char.

    At least 1 uppercase

    At least 1 number

    At least 1 special char.

  • At least 8 char.

    At least 1 uppercase

    At least 1 number

    At least 1 special char.

  • At least 8 char.

    At least 1 uppercase

    At least 1 number

    At least 1 special char.

Secure Data Handling

Secure Data Handling

Secure Data Handling

Employs input validation, encryption, and audits to safeguard sensitive information and ensure data integrity.

Employs input validation, encryption, and audits to safeguard sensitive information and ensure data integrity.

Employs input validation, encryption, and audits to safeguard sensitive information and ensure data integrity.

Datetime

By

Log Entry

04/13/2020 - 3:32 am

jadetan

Attempted login

04/13/2020 - 3:33 am

jadetan

Attempted login

05/01/2020 - 5:29 pm

admin

Changed “ritawong” - ID

07/31/2020 - 10:58 pm

manager

Changed “0bjs-iqqn” - Status

ACCOUNT MANAGEMENT

Users

Managers

SYSTEM MANAGEMENT

System Logs

Access Logs

Access Attempts

Efficient Management

Efficient Management

Efficient Management

Equips admins with tools for streamlined library content and user access management.

Equips admins with tools for streamlined library content and user access management.

Equips admins with tools for streamlined library content and user access management.