Descriptor
Author
Breeding, Marshall | 1 |
Breeding, Michael | 1 |
Fore, Julie A. | 1 |
Garrison, William V. | 1 |
Hawke, Constance S. | 1 |
McClellan, Gregory A. | 1 |
Szuba, Tom | 1 |
Walery, Darrell | 1 |
Williams, Robert L. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Guides - Non-Classroom | 3 |
Books | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - General | 1 |
Education Level
Audience
Practitioners | 9 |
Media Staff | 5 |
Administrators | 3 |
Students | 1 |
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Breeding, Marshall – Computers in Libraries, 2005
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
Descriptors: Libraries, Internet, Computer Networks, Computer Security

Walery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Williams, Robert L. – 2001
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data

Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software