KMWorld CRM Media Streaming Media Faulkner Speech Technology Unisphere/DBTA ITIResearch.com
PRIVACY/COOKIES POLICY
Other ITI Websites
American Library Directory Boardwalk Empire Database Trends and Applications DestinationCRM EContentMag Faulkner Information Services Fulltext Sources Online InfoToday Europe Internet@Schools Intranets Today ITIResearch.com KMWorld Library Resource Literary Market Place OnlineVideo.net Plexus Publishing Smart Customer Service Speech Technology Streaming Media Streaming Media Europe Streaming Media Producer



Magazines > Computers in Libraries > March 2005

Back Index Forward
 




Computers in Libraries
SUBSCRIBE NOW!
VOLUME 25, NUMBER 3 March 2005
Computers in Libraries
Complete Coverage of Library Information Technology

This Month: Keeping your network Secure


Click for summary and full-text ($$) options from ITI  InfoCentral! Articles in this issue of Computers in Libraries are available in a variety of formats — Preview, Full Text, Text+Graphics, and Page Image PDF — on a pay-per-view basis, courtesy of ITI's InfoCentral.  

Click on the logo for a summary and full-text purchase options! Articles with theClick for full-text HTML version (free) from Information Today, Inc.!image are also available in full-text (HTML) on this site.

FEATURES

Surviving Hacker Attacks Proves that Every Cloud Has a Silver LiningClick for full-text HTML version (free) from Information Today, Inc.!
Having your server attacked by hackers may leave you feeling like you've been struck by lightning. But if you take the opportunity to improve your security procedures and your systems administrator skills, you will find the sun peeking through the clouds.
By Kirby Cheng

Page 6

Understand the Big Picture so You Can Plan for Network Security Click for full-text HTML version (free) from Information Today, Inc.!
When you're talking network security, your best defense is to have a comprehensive plan in place. But to make a really complete plan, you need to understand the big picture. You need to know where threats can come from, and how. This overview will get you started on your security plans or help you evaluate those you already have in place.
By Frank Cervone

Page 10
A Delicate Balance: National Security vs. Public AccessClick for full-text HTML version (free) from Information Today, Inc.!
What sorts of documents does the government keep to itself, and why? How does the Department of Defense decide what information should be classified? These authors allow us an inside look at how the U.S. government handles information security.
By Bonnie Klein and Sandy Schwalb
Page 13
COLUMNS
Computers in Small Libraries
Small Libraries, Big TechnologyClick for full-text HTML version (free) from Information Today, Inc.!
By Gary Roberts
Page 24
Online Treasures
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library ComputersClick for full-text HTML version (free) from Information Today, Inc.!
By Janet L. Balas
Page 28
The Systems Librarian
Implementing Wireless Networks Without Compromising SecurityClick for full-text HTML version (free) from Information Today, Inc.!
By Marshall Breeding
Page 31
Coming Full Circle
Surviving Chronic E-Mail FatigueClick for full-text HTML version (free) from Information Today, Inc.!
By Andrew Pace
Page 34
DEPARTMENTS

Editor's Notes
The Need to Feel SecureClick for full-text HTML version (free) from Information Today, Inc.!
By Kathy Dempsey

Page 4

Newsline

Page 36

ask techmanClick for full-text HTML version (free) from Information Today, Inc.!
By D. Scott Brandt

Page 46
Noted & Quoted Click for full-text HTML version (free) from Information Today, Inc.! Page 48
SPECIAL SECTIONS

Computers in Libraries Conference Exhibitor List

Page 43
How to Write for CIL Click for full-text HTML version (free) from Information Today, Inc.! Page 50
ADVERTISING
Library Tech Connection Page 55
Index to Advertisers Page 56

       Back to top