Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 7 |
Library Networks | 7 |
Internet | 4 |
Access to Information | 3 |
Computer Networks | 3 |
Computer Software | 2 |
Information Technology | 2 |
Libraries | 2 |
Library Automation | 2 |
Library Services | 2 |
World Wide Web | 2 |
More ▼ |
Author
Bahr, Ellen | 1 |
Breeding, Michael | 1 |
Briden, Judi | 1 |
Cordes, Christofer Sean | 1 |
Garrison, William V. | 1 |
Lester, Dan | 1 |
McClellan, Gregory A. | 1 |
Reeb, Brenda | 1 |
Schneider, Karen G. | 1 |
Zhang, Allison | 1 |
Publication Type
Reports - Descriptive | 7 |
Journal Articles | 6 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Media Staff | 2 |
Practitioners | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Schneider, Karen G. – Library Journal, 2007
Over the next several decades, libraries will face the potential loss of all the e-journals, ebooks, electronic theses, local digital collections, and other "e-stuff" curated for the public good. A solution to this problem is LOCKSS ("Lots of Copies Keep Stuff Safe"), a free, open-source digital-preservation software from Stanford University that…
Descriptors: Computer Software, Libraries, Library Networks, Library Services

Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication
Cordes, Christofer Sean – EDUCAUSE Quarterly, 2005
Spyware is the general term that describes a collection of technologies that help external parties in "gathering information about a person or organization without their knowledge." In addition to the minor annoyances spyware generates, such as redirected pages, redirected searches, and pop-up ads, a spyware infection can have more malicious…
Descriptors: Internet, Prevention, Computer Security, Information Technology

Lester, Dan – Library Computing, 1999
An experienced library technology manager relates what happened in the wake of a serious library computer virus attack, which he accidentally unleashed. The narrative describes the combination of coincidences, mistakes, assumptions, and delays that caused the incident, and outlines the 10 key lessons learned. (AEF)
Descriptors: Computer Security, Electronic Mail, Library Equipment, Library Networks
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security