FEATURES |
How Much
Security Does Your Library Need?
Few doctors would prescribe lots of pills
and unnecessary surgery as an ongoing health
regimen. In the same way, it's possible to "overdo" security
measures for your library computers. This author
explains how to keep your systems healthy and
functioning by taking sensible security measures.
by Kyle Banerjee |
Page 12 |
Uncovering
the 'Spy' Network: Is Spyware Watching Your Library
Computers?
You have a firewall, passwords, and antivirus
softwarebut are these enough to keep
prying eyes out of your computers? Often silent
and invisible, "spyware" can sneak around these
security measures and compromise your passwords,
patron information, and everything else on
your computers. Find out what you can do to
stop it.
by Daniel Fidel Ferrer and Mary Mead |
Page 16 |
An Easy Way to Perform
Critical Updates
Are you tired of updating software and downloading
patches, all day long, one PC at a time? No more!
This trio found a
way to have all machines updated automatically, all the time for Microsoft
Critical Updates. They share their time-saving, aggravation-saving software
solution with CIL readers.
by Charles Elton, Michael Tucker, and Donna McDonald |
Page 22 |
A Quick Guide to Basic
Network Security Terms
If you could use a little more information
about today's
security terminology, this handy guide will give you all the basics at-a-glance.
Photocopy it and post it in your office!
by Dina and Vijay Kanabar |
Page 24 |
COLUMNS |
The View from the Top
Left Corner
You Are Under Attack 24 Hours a Day, 7 Days
a Week
by Michael Schuyler |
Page 26 |
Online Treasures
Security in the LibraryTechnology Brings
a New Twist to an Old Problem
by Janet L. Balas |
Page 28 |
Building Digital Libraries
Managing a 'Forest' of Servers and Documents
by Terence
K. Huwe |
Page 31 |
Techman's TechPage
A Different Spin on Security
by
D. Scott Brandt |
Page 34 |
The Systems Librarian
Defending
Your
ILS
Against
Security
Threats
by
Marshall
Breeding |
Page 38 |
DEPARTMENTS |
Editor's Notes
Security Blanket
by Kathy Dempsey |
Page 6 |
Newsline |
Page 8 |
Newsline Reports
CIL Magazine Brought to Life at Annual
CIL Conference in D.C.
by Kathy Dempsey and Elisabeth Winter |
Page 10 |
Commentary
Password Security Is a Must for Any Organization
by Marshall A. Berger |
Page 41 |
People & Places |
Page 42 |
SPECIAL
SECTION |
How
to Contribute to CIL |
Page 51 |
ADVERTISING |
Index
to Advertisers |
Page 55 |