Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 6 |
Library Automation | 6 |
Internet | 4 |
Computer Networks | 3 |
Libraries | 3 |
Access to Information | 2 |
Computer System Design | 2 |
Library Equipment | 2 |
Library Policy | 2 |
Local Area Networks | 2 |
Users (Information) | 2 |
More ▼ |
Source
Computers in Libraries | 6 |
Author
Bahr, Ellen | 1 |
Benson, Allen C. | 1 |
Charnetski, J. R. | 1 |
Ives, David J. | 1 |
Kutty, Ashwin | 1 |
Nikkel, Terry | 1 |
Sylvia, Margaret | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Guides - Non-Classroom | 2 |
Education Level
Higher Education | 1 |
Audience
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication
Charnetski, J. R. – Computers in Libraries, 1998
Discusses the use of firewalls for library intranets, highlighting the move from mainframes to PCs, security issues and firewall architecture, and operating systems. Provides a glossary of basic networking terms and a bibliography of suggested reading. (PEN)
Descriptors: Bibliographies, Computer Networks, Computer Security, Computer System Design
Sylvia, Margaret – Computers in Libraries, 1995
Addresses issues to consider when upgrading library CD-ROM networks for multimedia applications. Topics includes security issues; workstation requirements such as soundboards and monitors; local area network configurations that avoid bottlenecks: Asynchronous Transfer Mode, Ethernet, and Integrated Services Digital Network; server performance…
Descriptors: Computer Networks, Computer Security, Evaluation Criteria, Library Automation
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services