VOLUME 25, NUMBER 3 — March 2005 Computers in Libraries Complete Coverage of Library Information Technology
This Month:Keeping
your network Secure
Articles in this issue of Computers in
Libraries are available in a variety of formats — Preview, Full
Text, Text+Graphics, and Page Image PDF — on a pay-per-view basis,
courtesy of ITI's
InfoCentral.
Click on the
logo for a summary and full-text purchase options! Articles with theimage
are also available in full-text (HTML) on this site.
FEATURES
Surviving Hacker
Attacks Proves that Every Cloud Has a Silver
Lining
Having your server attacked by hackers may leave you feeling like you've been
struck by lightning. But if you take the opportunity to improve your security
procedures and your systems administrator skills, you will find the sun peeking
through the clouds. By Kirby Cheng
Page
6
Understand the Big
Picture so You Can Plan for Network Security
When you're talking network security, your best defense is to have a comprehensive
plan in place. But to make a really complete plan, you need to understand the
big picture. You need to know where threats can come from, and how. This overview
will get you started on your security plans or help you evaluate those you already
have in place. By Frank Cervone
Page 10
A Delicate Balance:
National Security vs. Public Access What sorts of documents does the government keep
to itself, and why? How does the Department of Defense
decide what information should be classified? These
authors allow us an inside look at how the U.S. government
handles information security. By Bonnie Klein and Sandy Schwalb