Library Hi Tech: Volume 15 Issue 1/2

Subjects:

Table of contents

Designing secure library networks

Marshall Breeding

Focuses on designing a library network to maximize security. Considers various options including separation of staff servers from public servers, subdividing the network using a…

A commercial software approach to workstation security

Dan Marmion

Uses the experience of Western Michigan University to consider ways of eliminating deliberate misuse of public library systems. Outlines the use of Fortes 101, an Integrity Kiosk…

Public workstation security: using operating systems and hardware tricks

Garvin Brakel

Presents the security experiences of Spokane public library, which operates a client/server‐based wide area network of 200 PCs and four servers. Outlines its main security…

Securing public workstation by maintaining software centrally

Erik J. Biever

Considers the maintenance of secure public workstations through the use of a network server which centralizes software maintenance. Presents the experience of the libraries of the…

The changing role in a networked information environment

Clifford A. Lynch

Outlines the traditional issues surrounding authentication and authorization before charting the changing nature of the requirements for these services, as a fully networked…

TAO of gateway: providing Internet access to licensed databases

William V. Garrison, Gregory A. McClellan

Presents the use of libraries as gateways providing the patron with access to the commercial vendor. Outlines the methods employed by the Mann Library at Cornell University and…

Decentralized account management in a library consortium: a report of HSLC’s implemenation of Guardian

Anita S. Wagner, Alan C. Simon, Cindy A. Pitchon, Dennis J. Gormley

Presents a case study of the Health Sciences Libraries Consortium in Philadelphia using Ovid Technologies’ search system, database and Web gateway. Considers the authentication…

Using Bluestem for Web user authentication and access control of library resources

Timothy W. Cole

Profiles the use of the program Bluestem developed by the University of Illinois for the control of access and authentication. Uses HTTPs and HTTP cookies to identify users from a…

The ICAAP Project, Part One: a continuum of security needs for the CIC virtual electronic library

Merri Beth Lavagnino

Introduces a continuum of security needs for electronic libraries, starting from the most basic protection through to complicated encryption systems. Considers these against the…

The ICAAPProject, Part Two: the Web architecture

Bob Riddle

Outlines the goals and objectives of the Inter Committee on Insitutional Co‐operation Authentication and Authorisation project (ICAAP) project in relation to the infrastructure…

The ICAAP Project, Part Three: OSF distributed computing environment

Scott Cantor

Outlines the use of distributed computing environment (DCE) software in the Inter Committee on Institutional Co‐operation Authentication and Authorisation project (ICAAP) project…

Things that go “bump” in the virtual night

Julie A. Fore

Considers the security of a server through the limiting of access, validity and integrity of information stored and maintenance of the availability and reliability of service…

After the break‐in occurs: how to handle the student hacker

Scott Muir

Outlines the experience of the University of Alabama when a hacker bypassed the preventative security measures of the library management system and accessed the operating system…

To catch a hacker

Greg German

Presents the experience of the Ohio Library and Information Network, OhioLINK, when a group of hackers accessed the system in 1994. Discusses the identification and collection of…

Give yourself a break; don’t give the hackers one

Jim Rosaschi

Discusses the experience of Sonoma County Library when a hacker accessed the network and caused chaos to the maintenance of the system. Covers the effect of the hacker, the…

Time for new OPAC initiatives: an overview of landmarks in the literature and introduction to WordFocus

Joseph R. Matthews

Computer technology continues to evolve and improve at an astonishing rate; and the cost for most computer equipment will continue to decline over time. Now library automation…

The impact of electronic information sources on collection development: a survey of current practice

O. Gene Norman

This study investigates the effects of electronic information sources on collection development in 15 academic libraries, primarily in the Midwest. A search of the literature and…

1546

Authorware for computer‐assisted instruction

Chris Niemeyer

Authorware is a sophisticated computer application that is ideal for computer‐assisted instruction. The application is at once powerful yet easy to learn. The Iowa State…

Information dropshipping

T.D. Webb, Bin Zhang

The appearance of revolutionary information technologies must elicit equivalent responses from the library profession, if for no other reason than simply to provide services that…

Buying your next PC: comments and perspectives

Walt Crawford

Unless you’re an inveterate upgrader, you’ll replace your personal computer every few years. Computer crazies say “every 18 months,” and a few retrograde managers might say “when…

Cover of Library Hi Tech

ISSN:

0737-8831

Online date, start – end:

1983

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editors:

  • Dr Dickson K.W. Chiu
  • Dr Kevin K.W. Ho