NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewed Peer reviewed
Heijne, Maria – Electronic Library, 1992
Describes the activities of SURFnet BV, a research network that provides information and communication services in higher education and scientific or industrial research in The Netherlands. Topics discussed include standardization; user services, including electronic mail; costs of using SURFnet; user support services; and the role of libraries in…
Descriptors: Computer Networks, Costs, Databases, Electronic Mail
Peer reviewed Peer reviewed
van der Westhuizen, Erica E.; Miller, E. Stan – Electronic Library, 1995
Discusses how the Veterinary Science Library at the University of Pretoria (South Africa) promotes electronic communication through various Internet and other network links. Provides a sample of online information sources available to veterinary teams and animal health workers, and a list of electronic addresses for South African libraries and…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Uses in Education