NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Peer reviewed Peer reviewed
Cain, Mark – Journal of Academic Librarianship, 2003
Discusses personal digital assistants (PDAs). Highlights include history and characteristics of PDAs; beyond the "organizer" function and use of PDAs in higher education and academic libraries; problems and possibilities of a wirelessly networked PDA in a library; and the future outlook for PDAs. (AEF)
Descriptors: Academic Libraries, Computer Networks, Educational Technology, Higher Education
Machovec, George S. – Online Libraries and Microcomputers, 1993
Discusses factors to consider when estimating the number of public access terminals (PACs) or workstations needed in public and academic libraries for online catalogs, including building size and layout, physical facilities, resources available through the system, peripheral equipment, graphical user interfaces, remote users, system capacity, and…
Descriptors: Academic Libraries, Computer Networks, Computer Peripherals, Higher Education
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Johnson, Doug – School Library Journal, 1995
Discusses the restructuring of the Mankato, Minnesota school media program, accomplished by merging library and technology programs. Addresses time frame; necessary equipment and resources; computer networking; scheduled in-service training; and involvement of parents, teachers, and the school board. A sidebar lists five elements vital to a…
Descriptors: Computer Networks, Educational Change, Educational Technology, Elementary Secondary Education