| FEATURES | 
                        
                          | How Much
                                Security Does Your Library Need? Few doctors would prescribe lots of pills
                                  and unnecessary surgery as an ongoing health
                                  regimen. In the same way, it's possible to "overdo" security
                                  measures for your library computers. This author
                                  explains how to keep your systems healthy and
                                  functioning by taking sensible security measures.
 by Kyle Banerjee
 | Page 12 | 
                        
                          | Uncovering
                                the 'Spy' Network: Is Spyware Watching Your Library
                                Computers?   You have a firewall, passwords, and antivirus
                                  softwarebut are these enough to keep
                                  prying eyes out of your computers? Often silent
                                  and invisible, "spyware" can sneak around these
                                  security measures and compromise your passwords,
                                  patron information, and everything else on
                                  your computers. Find out what you can do to
                                  stop it.
 by Daniel Fidel Ferrer and Mary Mead
 | Page 16 | 
                        
                          | An Easy Way to Perform
                              Critical Updates Are you tired of updating software and downloading
                                patches, all day long, one PC at a time? No more!
                                This trio found a
 way to have all machines updated automatically, all the time for Microsoft
      Critical Updates. They share their time-saving, aggravation-saving software
      solution with CIL readers.
 by Charles Elton, Michael Tucker, and Donna McDonald
 | Page 22 | 
                        
                          | A Quick Guide to Basic
                              Network Security Terms If you could use a little more information
                                about today's
 security terminology, this handy guide will give you all the basics at-a-glance.
      Photocopy it and post it in your office!
 by Dina and Vijay Kanabar
 | Page 24 | 
                        
                          | COLUMNS | 
                        
                          | The View from the Top
                              Left Corner You Are Under Attack 24 Hours a Day, 7 Days
                                a Week
 by Michael Schuyler
 | Page 26 | 
                        
                          | Online Treasures Security in the LibraryTechnology Brings
                              a New Twist to an Old Problem
 by Janet L. Balas
 | Page 28 | 
                        
                          | Building Digital Libraries Managing a 'Forest' of Servers and Documents
 by Terence
                                                            K. Huwe
 | Page 31 | 
                        
                          | Techman's TechPage A Different Spin on Security
 by
                                                                                    D. Scott Brandt
 | Page 34 | 
                        
                          |   The Systems Librarian Defending
                                                                                                                   Your
                                                                                                                   ILS
                                                                                                                   Against
                                                                                                                   Security
                                                                                                                   Threats
  by
                                                                                                                                  Marshall
                                                                                                                                  Breeding
 | Page 38 | 
                        
                          | DEPARTMENTS | 
                        
                          | Editor's Notes Security Blanket
  by Kathy Dempsey
 | Page 6 | 
                        
                          | Newsline   | Page 8 | 
                        
                          | Newsline Reports CIL Magazine Brought to Life at Annual
                              CIL Conference in D.C.
 by Kathy Dempsey and Elisabeth Winter
 | Page 10 | 
                        
                          | Commentary Password Security Is a Must for Any Organization
 by Marshall A. Berger
 | Page 41 | 
                        
                          | People & Places | Page 42 | 
                        
                          | SPECIAL
                                  SECTION | 
                        
                          | How
                                  to Contribute to CIL   | Page 51 | 
                        
                          | ADVERTISING | 
                        
                          | Index
                                to Advertisers | Page 55 |