Information Today, Inc. Corporate Site KMWorld CRM Media Streaming Media Faulkner Speech Technology DBTA/Unisphere
PRIVACY/COOKIES POLICY
Other ITI Websites
American Library Directory Boardwalk Empire Database Trends and Applications DestinationCRM Faulkner Information Services Fulltext Sources Online InfoToday Europe KMWorld Literary Market Place Plexus Publishing Smart Customer Service Speech Technology Streaming Media Streaming Media Europe Streaming Media Producer Unisphere Research



Magazines > Computers in Libraries > March 2005

Back Index Forward
 




Computers in Libraries
SUBSCRIBE NOW!
VOLUME 25, NUMBER 3 — March 2005
Computers in Libraries
Complete Coverage of Library Information Technology

This Month: Keeping your network Secure

 
FEATURES

Surviving Hacker Attacks Proves that Every Cloud Has a Silver LiningClick for full-text HTML version (free) from Information Today, Inc.!
Having your server attacked by hackers may leave you feeling like you've been struck by lightning. But if you take the opportunity to improve your security procedures and your systems administrator skills, you will find the sun peeking through the clouds.
By Kirby Cheng

Page 6

Understand the Big Picture so You Can Plan for Network Security 
When you're talking network security, your best defense is to have a comprehensive plan in place. But to make a really complete plan, you need to understand the big picture. You need to know where threats can come from, and how. This overview will get you started on your security plans or help you evaluate those you already have in place.
By Frank Cervone

Page 10
A Delicate Balance: National Security vs. Public Access
What sorts of documents does the government keep to itself, and why? How does the Department of Defense decide what information should be classified? These authors allow us an inside look at how the U.S. government handles information security.
By Bonnie Klein and Sandy Schwalb
Page 13
COLUMNS
Computers in Small Libraries
Small Libraries, Big Technology
By Gary Roberts
Page 24
Online Treasures
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers
By Janet L. Balas
Page 28
The Systems Librarian
Implementing Wireless Networks Without Compromising Security
By Marshall Breeding
Page 31
Coming Full Circle
Surviving Chronic E-Mail Fatigue
By Andrew Pace
Page 34
DEPARTMENTS

Editor's Notes
The Need to Feel Secure
By Kathy Dempsey

Page 4

Newsline

Page 36

ask techman
By D. Scott Brandt

Page 46
Noted & Quoted  Page 48
SPECIAL SECTIONS

Computers in Libraries Conference Exhibitor List

Page 43
How to Write for CIL  Page 50
ADVERTISING
Library Tech Connection Page 55
Index to Advertisers Page 56

       Back to top