Information Today, Inc. Corporate Site KMWorld CRM Media Streaming Media Faulkner Speech Technology DBTA/Unisphere
Other ITI Websites
American Library Directory Boardwalk Empire Database Trends and Applications DestinationCRM Faulkner Information Services Fulltext Sources Online InfoToday Europe KMWorld Literary Market Place Plexus Publishing Smart Customer Service Speech Technology Streaming Media Streaming Media Europe Streaming Media Producer Unisphere Research

Magazines > Computers in Libraries > March 2005

Back Index Forward

Computers in Libraries
VOLUME 25, NUMBER 3 — March 2005
Computers in Libraries
Complete Coverage of Library Information Technology

This Month: Keeping your network Secure


Surviving Hacker Attacks Proves that Every Cloud Has a Silver LiningClick for full-text HTML version (free) from Information Today, Inc.!
Having your server attacked by hackers may leave you feeling like you've been struck by lightning. But if you take the opportunity to improve your security procedures and your systems administrator skills, you will find the sun peeking through the clouds.
By Kirby Cheng

Page 6

Understand the Big Picture so You Can Plan for Network Security 
When you're talking network security, your best defense is to have a comprehensive plan in place. But to make a really complete plan, you need to understand the big picture. You need to know where threats can come from, and how. This overview will get you started on your security plans or help you evaluate those you already have in place.
By Frank Cervone

Page 10
A Delicate Balance: National Security vs. Public Access
What sorts of documents does the government keep to itself, and why? How does the Department of Defense decide what information should be classified? These authors allow us an inside look at how the U.S. government handles information security.
By Bonnie Klein and Sandy Schwalb
Page 13
Computers in Small Libraries
Small Libraries, Big Technology
By Gary Roberts
Page 24
Online Treasures
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers
By Janet L. Balas
Page 28
The Systems Librarian
Implementing Wireless Networks Without Compromising Security
By Marshall Breeding
Page 31
Coming Full Circle
Surviving Chronic E-Mail Fatigue
By Andrew Pace
Page 34

Editor's Notes
The Need to Feel Secure
By Kathy Dempsey

Page 4


Page 36

ask techman
By D. Scott Brandt

Page 46
Noted & Quoted  Page 48

Computers in Libraries Conference Exhibitor List

Page 43
How to Write for CIL  Page 50
Library Tech Connection Page 55
Index to Advertisers Page 56

       Back to top