Descriptor
Internet | 11 |
Library Automation | 11 |
Access to Information | 5 |
Information Technology | 5 |
Local Area Networks | 5 |
Computer System Design | 4 |
Libraries | 4 |
Library Planning | 4 |
Electronic Libraries | 3 |
Guidelines | 3 |
Hypermedia | 3 |
More ▼ |
Author
Benson, Allen C. | 2 |
Boss, Richard W. | 1 |
Bucher, Katherine Toth | 1 |
Butterworth, Margaret, Ed. | 1 |
Corbly, James E. | 1 |
Coyle, Karen | 1 |
Howden, Norman | 1 |
Lancaster, F. W. | 1 |
Sandore, Beth | 1 |
Tyckoson, David A., Ed. | 1 |
Publication Type
Guides - Non-Classroom | 11 |
Books | 8 |
Collected Works - General | 3 |
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Location
Australia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Howden, Norman – 1997
This manual offers guidance for librarians on every aspect of local area networking from start-up through maintenance and trouble shooting. This second edition has been revised to include information on: definition and explication of TCP/IP; Novell 4.0; Internet connection gear; equipment capable of handling Web access; Windows NT and Windows for…
Descriptors: Computer Networks, Guidelines, Information Management, Internet

Corbly, James E. – Information Technology and Libraries, 1997
Offers 10 guidelines for librarians responsible for making decisions on whether to upgrade application software. Examines the Internet, client/server LAN (local area network) architecture, developments in contemporary stand-alone systems, and graphic user interfaces to determine their impact on the upgrading process. (AEF)
Descriptors: Computer Interfaces, Computer Software Evaluation, Computer Software Selection, Guidelines
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Lancaster, F. W.; Sandore, Beth – 1997
This books deals with the logical intersection of technology and management in the context of libraries and other information centers. It is divided into the following sections: Effects of Technology on the Institution and its Management; Effects of Technology on Services and Users; and Special Issues in the Management of Technology. Chapters are…
Descriptors: Access to Information, Document Delivery, Higher Education, Information Management
Coyle, Karen – 1997
This book provides a selection of documentary background information on areas of the Information Highway debate that are particularly relevant to libraries. The book is designed for librarians who are online but have little time to explore the general areas of information policy, and for those not yet connected to the Internet who need to…
Descriptors: Access to Information, Background, Censorship, Copyrights
Benton Foundation, Washington, DC. – 1997
Libraries have long been pivotal community institutions--public spaces where people can come together to learn, reflect, and interact. Today, information is rapidly spreading beyond books and journals to digital government archives, business databases, electronic sound and image collections, and the flow of electronic impulses over computer…
Descriptors: Access to Information, Advocacy, Case Studies, Change Agents
Boss, Richard W. – 1997
One of the most significant decisions in a library administrator's career is the decision to automate one or more of a library's operations. This book describes the present state of local library automation; the planning, selection, and implementation process; and the library administrator's role in the process. The bulk of the text provides a…
Descriptors: Computer Software, Costs, Decision Making, Information Technology
Bucher, Katherine Toth – 1998
This book is a practical, easy-to-use reference source written to help school library media specialists cope with and enjoy technology. Along with explaining technology, the book suggests ways to set up technology, use it, manage it, troubleshoot it, and introduce it to students, teachers, and staff. The book is intended for librarians and…
Descriptors: Computer Literacy, Computer System Design, Computer Uses in Education, Distance Education
Tyckoson, David A., Ed. – 1991
This book addresses the problem of when a library has limited catalog access, and explores various technological methods to expand the catalog beyond its traditional boundaries. Fourteen chapters describe catalog projects in individual libraries: (1) "Enhancing Access to Information: Building Catalogs for the Future" (David A. Tyckoson);…
Descriptors: Academic Libraries, Access to Information, Bibliographic Databases, Bibliographic Records
Butterworth, Margaret, Ed. – 1997
This book reviews the latest Australian literature on the role of the teacher librarian. It discusses the impact of the Internet on the supply of and demand for information, and demonstrates the need for planned implementation of information technology in schools, with teacher librarians playing a vital and influential role. Fifteen chapters are…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Curriculum Development, Distance Education