Online KMWorld CRM Media Streaming Media Faulkner Speech Technology Unisphere/DBTA
Other ITI Websites
American Library Directory Boardwalk Empire Database Trends and Applications DestinationCRM Faulkner Information Services Fulltext Sources Online InfoToday Europe KMWorld Literary Market Place Plexus Publishing Smart Customer Service Speech Technology Streaming Media Streaming Media Europe Streaming Media Producer Unisphere Research



Magazines > Computers in Libraries > May 2003
Back Index Forward
 




Computers in Libraries
SUBSCRIBE NOW!
VOLUME 23, NUMBER 5 — May 2003
Computers in Libraries
Complete Coverage of Library Information Technology

This Month: Building Digital Collections

FEATURES

How Much Security Does Your Library Need?
Few doctors would prescribe lots of pills and unnecessary surgery as an ongoing health regimen. In the same way, it's possible to "overdo" security measures for your library computers. This author explains how to keep your systems healthy and functioning by taking sensible security measures.
by Kyle Banerjee

Page 12
Uncovering the 'Spy' Network: Is Spyware Watching Your Library Computers?
You have a firewall, passwords, and antivirus software—but are these enough to keep prying eyes out of your computers? Often silent and invisible, "spyware" can sneak around these security measures and compromise your passwords, patron information, and everything else on your computers. Find out what you can do to stop it.
by Daniel Fidel Ferrer and Mary Mead
Page 16
An Easy Way to Perform Critical Updates
Are you tired of updating software and downloading patches, all day long, one PC at a time? No more! This trio found a
way to have all machines updated automatically, all the time for Microsoft Critical Updates. They share their time-saving, aggravation-saving software solution with
CIL readers.
by Charles Elton, Michael Tucker, and Donna McDonald
Page 22
A Quick Guide to Basic Network Security Terms
If you could use a little more information about today's
security terminology, this handy guide will give you all the basics at-a-glance. Photocopy it and post it in your office!

by Dina and Vijay Kanabar
Page 24
COLUMNS
The View from the Top Left Corner
You Are Under Attack 24 Hours a Day, 7 Days a Week
by Michael Schuyler
Page 26
Online Treasures
Security in the Library—Technology Brings a New Twist to an Old Problem
by Janet L. Balas
Page 28
Building Digital Libraries
Managing a 'Forest' of Servers and Documents
by Terence K. Huwe
Page 31
Techman's TechPage
A Different Spin on Security
by D. Scott Brandt
Page 34

The Systems Librarian
Defending Your ILS Against Security Threats
by Marshall Breeding

Page 38
DEPARTMENTS
Editor's Notes
Security Blanket
by Kathy Dempsey
Page 6

Newsline

Page 8
Newsline Reports
CIL Magazine Brought to Life at Annual CIL Conference in D.C.
by Kathy Dempsey and Elisabeth Winter
Page 10
Commentary
Password Security Is a Must for Any Organization
by Marshall A. Berger
Page 41
People & Places Page 42
SPECIAL SECTION

How to Contribute to CIL

Page 51
ADVERTISING
Index to Advertisers Page 55

       Back to top