FEATURES
|
Surviving
Hacker Attacks Proves that Every Cloud Has a Silver Lining
Having your server attacked by hackers may leave you feeling like
you've been
struck by lightning. But if you take the opportunity to improve your
security
procedures and your systems administrator skills, you will find the sun
peeking
through the clouds.
By Kirby Cheng
|
Page 6
|
Understand the Big
Picture so You Can Plan for Network Security
When you're talking network security, your best defense is to have a
comprehensive
plan in place. But to make a really complete plan, you need to
understand the
big picture. You need to know where threats can come from, and how.
This overview
will get you started on your security plans or help you evaluate those
you already
have in place.
By Frank Cervone
|
Page
10 |
A
Delicate Balance: National Security vs. Public Access
What sorts of documents does
the government keep to itself, and why? How does the Department of
Defense decide what information should be classified? These authors
allow us an inside look at how the U.S. government handles information
security.
By Bonnie Klein and Sandy Schwalb
|
Page
13 |
COLUMNS |
Computers
in Small Libraries
Small Libraries, Big Technology
By Gary Roberts
|
Page
24 |
Online
Treasures
Close the Gate, Lock the
Windows, Bolt the Doors: Securing Library Computers
By Janet L. Balas
|
Page
28 |
The
Systems Librarian
Implementing Wireless Networks
Without Compromising Security
By Marshall Breeding
|
Page
31 |
Coming
Full Circle
Surviving Chronic E-Mail Fatigue
By Andrew Pace |
Page
34 |
DEPARTMENTS
|
Editor's Notes
The Need to Feel Secure
By Kathy Dempsey
|
Page
4 |
Newsline
|
Page
36 |
ask techman
By D. Scott Brandt
|
Page
46 |
Noted & Quoted |
Page
48 |
SPECIAL
SECTIONS |
Computers in Libraries
Conference Exhibitor List
|
Page
43 |
How
to Write for CIL |
Page
50 |
ADVERTISING
|
Library
Tech Connection |
Page
55 |
Index to Advertisers |
Page
56 |