Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Interfaces | 3 |
Library Administration | 3 |
Library Automation | 3 |
Computer Security | 2 |
Database Management Systems | 2 |
Library Policy | 2 |
Authority Control… | 1 |
Barriers | 1 |
Cataloging | 1 |
Computer Networks | 1 |
Computer Software Reviews | 1 |
More ▼ |
Author
Combs, Joseph, Jr. | 1 |
Dahlquist, Janet | 1 |
Emrich, Beth | 1 |
Ives, David J. | 1 |
Oliver, Astrid | 1 |
Tankersley, Jan | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Book/Product Reviews | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 1 |
Audience
Media Staff | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Oliver, Astrid; Dahlquist, Janet; Tankersley, Jan; Emrich, Beth – Journal of Access Services, 2010
This article discusses the processes that occurred when the Library, Controller's Office, and Information Technology Department agreed to create an interface between the Library's Innovative Interfaces patron database and campus administrative software, Banner, using file transfer protocol, in an effort to streamline the Library's accounts…
Descriptors: Database Management Systems, Information Technology, Computer System Design, Computer Interfaces
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources

Combs, Joseph, Jr. – Library Software Review, 1995
Reviews the Total Library Computerization program, which can be used to manage small to midsized libraries. Discusses costs; operating system requirements; security features; user-interface styles; and system modules including online cataloging, circulation, serials control, acquisitions, authorities control, and interlibrary loan. (Author/JMV)
Descriptors: Authority Control (Information), Cataloging, Computer Interfaces, Computer Security