NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Peer reviewed Peer reviewed
Moran, Barbara B.; And Others – College and Research Libraries, 1987
Describes the Scholar's Workstation project, a campuswide computerization project at Brown University, and assesses its effects on the role and operation of the institution's libraries. Suggestions are provided for other libraries whose institutions are exploring the possibility of a similar venture. (CLB)
Descriptors: Case Studies, College Libraries, Computer Networks, Computer Uses in Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software