Descriptor
Computer Security | 5 |
Library Administration | 5 |
Library Equipment | 5 |
Library Policy | 4 |
Computer Networks | 3 |
Library Planning | 3 |
Libraries | 2 |
Library Personnel | 2 |
Academic Libraries | 1 |
Computer Interfaces | 1 |
Computer Software | 1 |
More ▼ |
Author
Banerjee, Kyle | 1 |
Ives, David J. | 1 |
King, Monica | 1 |
Soete, George J., Comp. | 1 |
Williams, Robert L. | 1 |
Zimmerman, Glen, Comp. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Guides - Non-Classroom | 2 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Canada | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Williams, Robert L. – 2001
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Soete, George J., Comp.; Zimmerman, Glen, Comp. – 1999
This SPEC (Systems and Procedures Exchange Center) Kit and Flyer reports results of a survey conducted in January 1999 that examined how ARL (Association of Research Libraries) member libraries assure the safety and security of persons, library materials, physical facilities, furnishings, computer equipment, etc. Forty-five of the 122 ARL member…
Descriptors: Academic Libraries, Computer Security, Foreign Countries, Higher Education