NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Johnson, Denise – Computers in Libraries, 1991
Discussion of concerns of librarians who are involved in CD-ROM selection and acquisition focuses on three main areas: (1) sources for discovering and investigating CD-ROM products, including an annotated bibliography of journals, publisher's catalogs, books, network conferences, and online indexes; (2) criteria for selection; and (3) vendor…
Descriptors: Annotated Bibliographies, Computer Networks, Evaluation Criteria, Library Collection Development