Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 13 |
Since 2016 (last 10 years) | 38 |
Since 2006 (last 20 years) | 140 |
Descriptor
Source
Author
Nickerson, Gord | 6 |
Breeding, Marshall | 4 |
Descy, Don E. | 4 |
Eastman, Skip | 3 |
Green, Kenneth C. | 3 |
Harris, Judi | 3 |
Machovec, George S. | 3 |
Basch, Reva | 2 |
Behrens, John T. | 2 |
Coffman, Steve | 2 |
Duin, Ann Hill | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 65 |
Teachers | 28 |
Administrators | 22 |
Policymakers | 15 |
Students | 6 |
Media Staff | 5 |
Researchers | 5 |
Parents | 4 |
Community | 1 |
Counselors | 1 |
Location
Australia | 7 |
Canada | 7 |
Spain | 7 |
United States | 7 |
United Kingdom | 6 |
Florida | 4 |
Pennsylvania | 4 |
United Kingdom (England) | 4 |
Arizona | 3 |
California | 3 |
China | 3 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
Fast Response Survey System | 1 |
Program for International… | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks

Wolfe, Janet L. – CD-ROM Professional, 1994
Discusses issues to be considered when networking multimedia CD-ROMs. Topics addressed include CD-ROM networking software; license concerns; configurations for CD-ROM servers; data caching; SCSI devices; CD-ROM drives; workstation configurations, including minimum requirements for five popular CD-ROM titles; and system setup troubleshooting tips.…
Descriptors: Computer Networks, Computer Software, Optical Data Disks
Spitzer, Stephan; Brown, Stephen – Computers in Libraries, 2007
The Uniformed Services University of the Health Sciences, located on the National Naval Medical Center's campus in Bethesda, Maryland, is a medical education and research facility for the nation's military and public health community. In order to support its approximately 7,500 globally distributed users, the university's James A. Zimble Learning…
Descriptors: Electronic Libraries, Educational Resources, Medical Education, Learning Resources Centers

Descy, Don E. – TechTrends, 1995
Provides information on commercial connections to the Internet via gateways as opposed to direct connection or through a modem. Hardware and software requirements are described; and commercial online services offering an Internet gateway are discussed, including America Online, CompuServe, Delphi, GEnie, and Prodigy. (LRW)
Descriptors: Computer Networks, Computer Software, Gateway Systems, Online Vendors

Feustle, Joseph A., Jr. – Hispania, 1992
Advantages of using online systems are described, and specific techniques for successfully transmitting computer text files are described. Topics covered include Microsoft's Rich TextFile, WordPerfect encoding, text compression, and especially encoding and decoding with UNIX programs. (LB)
Descriptors: Computer Networks, Computer Software, Online Systems, Word Processing
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics
Machovec, George S. – Online Libraries and Microcomputers, 1994
Describes Mosaic, an Internet resource locator and navigation tool developed at the University of Illinois' National Center for Super-Computing Applications (NCSA). Topics discussed include the relationship with the World Wide Web; flexibility; obtaining Mosaic client software; and file transfer protocol instructions. (Contains seven references.)…
Descriptors: Computer Networks, Computer Software, File Transfer Protocol, Information Networks

Hatfield, Thomas H. – Journal of Environmental Health, 1995
This article has three objectives: (1) introduce the basics of the World Wide Web (including Internet connectivity, hypertext, and uniform resource locators); (2) highlight environmental health databases on the Web; and (3) discuss possible applications of the Web for the environmental health profession. (LZ)
Descriptors: Computer Networks, Computer Software, Databases, Educational Resources
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Mutch, Andrew; Ventura, Karen – Computers in Libraries, 2006
Every place has it--coffee shops, bookstores, universities ... and now libraries are offering wireless Internet access too. At the Waterford Township Public Library (Waterford, Michigan), Andrew Mutch created a wide-open wireless network using Public IP open source software. About 20 miles away, at the Novi Public Library (Novi, Michigan), Karen…
Descriptors: Telecommunications, Computer Networks, Internet, Public Libraries
Moore, Jack – Exceptional Parent, 1988
The article describes the IBM/Special Needs Exchange which consists of: (1) electronic mail, conferencing, and a library of text and program files on the CompuServe Information Service; and (2) a dial-in database of special education software for IBM and compatible computers. (DB)
Descriptors: Computer Networks, Computer Software, Disabilities, Electronic Mail