No. 15-1/2, April 1997
Index
- Designing secure library networks
- A commercial software approach to workstation security
- Public workstation security: using operating systems and hardware tricks
- Securing public workstation by maintaining software centrally
- The changing role in a networked information environment
- TAO of gateway: providing Internet access to licensed databases
- Decentralized account management in a library consortium: a report of HSLC’s implemenation of Guardian
- Using Bluestem for Web user authentication and access control of library resources
- The ICAAP Project, Part One: a continuum of security needs for the CIC virtual electronic library
- The ICAAPProject, Part Two: the Web architecture
- The ICAAP Project, Part Three: OSF distributed computing environment
- Things that go “bump” in the virtual night
- After the break‐in occurs: how to handle the student hacker
- To catch a hacker
- Give yourself a break; don’t give the hackers one
- Time for new OPAC initiatives: an overview of landmarks in the literature and introduction to WordFocus
- The impact of electronic information sources on collection development: a survey of current practice
- Authorware for computer‐assisted instruction
- Information dropshipping
- Buying your next PC: comments and perspectives