NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Peer reviewed Peer reviewed
King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Peer reviewed Peer reviewed
Gorman, Audrey J. – Knowledge Quest, 1999
Focuses on the library service principles of multisensory thinking, respect for the question, and respect for the questioner as they relate to people with learning disabilities and all users. Discusses reading difficulties of people with dyslexia, along with audiotape and computer technologies that libraries can use. Presents approaches to the…
Descriptors: Assistive Devices (for Disabled), Dyslexia, Information Services, Information Technology
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Peer reviewed Peer reviewed
Dixon, Judith – Public Libraries, 1996
The Dallas Public Library surveyed 21 surrounding public library systems to help identify barriers that limit children's use of public libraries. Describes identified barriers, examines causes of the barriers, and offers possible solutions. Tables present study results and list discontinued and current library outreach programs. (JMV)
Descriptors: Access to Information, Children, Library Equipment, Library Facilities
Peer reviewed Peer reviewed
Courtney, Nancy – Journal of Academic Librarianship, 2003
Most of 814 academic libraries surveyed allow onsite access to unaffiliated users, and many give borrowing privileges to certain categories of users. Use of library computers to access library resources and other computer applications is commonly allowed although authentication on library computers is increasing. Five tables show statistics.…
Descriptors: Academic Libraries, Access to Information, Higher Education, Library Equipment
Peer reviewed Peer reviewed
Dreger, Megan – North Carolina Libraries, 1997
Describes results of a survey of North Carolina selective depository libraries. Focuses on equipment, CD-ROM resources, Internet resources, and library policies. Results indicate that these depository libraries are making great strides in providing access to material in electronic format. Six tables show results. The questionnaire is included.…
Descriptors: Access to Information, Depository Libraries, Electronic Publishing, Government Publications