Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Access to Information | 2 |
| Computer Security | 2 |
| Libraries | 2 |
| Computer Mediated… | 1 |
| Computer Networks | 1 |
| Computer Software | 1 |
| Computers | 1 |
| Confidentiality | 1 |
| Information Technology | 1 |
| Internet | 1 |
| Librarians | 1 |
| More ▼ | |
Source
| Computers in Libraries | 2 |
Author
| Bahr, Ellen | 1 |
| Cervone, Frank | 1 |
Publication Type
| Journal Articles | 2 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication

Direct link
