NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Lester, Dan – Library Computing, 1999
An experienced library technology manager relates what happened in the wake of a serious library computer virus attack, which he accidentally unleashed. The narrative describes the combination of coincidences, mistakes, assumptions, and delays that caused the incident, and outlines the 10 key lessons learned. (AEF)
Descriptors: Computer Security, Electronic Mail, Library Equipment, Library Networks
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Computing, 1999
Presents a general review of features of version 2.1 of Total Library Computerization (TLC) for Windows from On Point, Inc. Includes information about pricing, hardware and operating systems, modules/functions available, user interface, security, on-line catalog functions, circulation, cataloging, and documentation and online help. A table…
Descriptors: Bibliographic Records, Computer Interfaces, Computer Software, Computer System Design
Peer reviewed Peer reviewed
Justie, Kevin M. – Library Computing, 1999
The WEBrary(R) databases at the Morton Grove Public Library (Illinois) provide patron-accessible searchable databases, easily available over the library's Web site. Database offerings include the locally maintained Song Collection Index, Obituary Index, Continuations Listings, On-Order files, topical and personalized New Acquisitions files, and…
Descriptors: Access to Information, Computer Oriented Programs, Computer Software, Databases