Descriptor
Computer Security | 3 |
Information Management | 3 |
Administration | 2 |
Internet | 2 |
Change Strategies | 1 |
Computer Networks | 1 |
Computer Oriented Programs | 1 |
Computer System Design | 1 |
Computers | 1 |
Crime | 1 |
Crime Prevention | 1 |
More ▼ |
Source
Computers in Libraries | 3 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security
Nyerges, Mike – Computers in Libraries, 1999
Describes one public school library's struggles and solutions to problems associated with managing its new Windows desktop. To implement goals for organizing the desktop, the library selected the FoolProof desktop security system, utilized networks administration to enforce the school's Acceptable Use Policy, and used Windows 95 System Policies.…
Descriptors: Administration, Computer Networks, Computer Security, Computer System Design