NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rodriguez, Michael; Tonyan, Joel; Wilson, Robert T. – Journal of Electronic Resources Librarianship, 2018
For electronic resources and reference librarians, fielding eresource access problems is often a daily task. A library user clicks on a link to an electronic journal article, book, or primary source and is unable to access the full text. Sometimes this problem occurs due to a lapsed subscription, a broken link, or a proxy configuration error. The…
Descriptors: Troubleshooting, Electronic Libraries, Access to Information, Handheld Devices
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks