Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 3 |
Electronic Mail | 3 |
Information Networks | 3 |
Library Services | 2 |
Telecommunications | 2 |
Academic Libraries | 1 |
Administrators | 1 |
Change | 1 |
Computer Networks | 1 |
Computer Software Development | 1 |
Computer Software Selection | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Opinion Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks

Gulliford, Bradley – Library Trends, 1998
Describes changes in services of the United Technologies Corporation Information Network from a traditional library system to a virtual system of World Wide Web sites, a document-delivery unit, telephone and e-mail reference, and desktop technical support to provide remote access. Staff time, security, and licensing issues are addressed.…
Descriptors: Change, Computer Security, Corporate Libraries, Document Delivery
Cole, Timothy W. – Computers in Libraries, 1995
Describes installation and configuration of Mosaic and a World Wide Web (WWW) site at Grainger Library. Challenges include choosing a WINSOCK; customizing Mosaic for public-access computers; reducing security risks; maximizing Multipurpose Internet Mail Extensions (MIME); designing a home page; producing Hypertext Markup Language (HTML) documents.…
Descriptors: Academic Libraries, Computer Networks, Computer Security, Computer Software Development