NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Computers in Libraries1
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing one result Save | Export
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management