NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
Peer reviewed Peer reviewed
Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Software Review, 1995
Reviews the Total Library Computerization program, which can be used to manage small to midsized libraries. Discusses costs; operating system requirements; security features; user-interface styles; and system modules including online cataloging, circulation, serials control, acquisitions, authorities control, and interlibrary loan. (Author/JMV)
Descriptors: Authority Control (Information), Cataloging, Computer Interfaces, Computer Security
Peer reviewed Peer reviewed
Kilpatrick, Thomas L., Ed. – Library Software Review, 1998
Provides annotations of 29 journal articles and six book reviews on a variety of topics related to technology in libraries, including collection development, computer-assisted instruction, databases, distance education, ergonomics, hardware, information technology, interlibrary loan and document supply, Internet, online catalogs, preservation,…
Descriptors: Annotated Bibliographies, Book Reviews, Computer Assisted Instruction, Computer Security