System Security in the Networked Library

transit-security-designAre your library systems secure? If your answer is “yes,” drop everything and read this issue now! Ask any computer security experts: they will tell you there is no such thing as a totally secure networked system. If your answer is “no,” this issue will clarify the problems of security, suggest some approaches to them, and describe some actual library experiences.

This collection of articles is organized into three sections: Public Workstation Security, Authentication and Authorization of Patrons, and Security Breach Consequences. In each section, the authors lay out general issues and techniques and describe real-life development projects, production implementations, and actual experiences.

Detailed Table of Contents / Introduction, by Merri Beth Lavagnino

Workstation Security

Part 1 – Designing Secure Library Networks by Marshall Breeding

Part 2 – A Commercial Software Approach to Workstation Security by Dan Marmion

Part 3 – Public Workstation Security: Using Operating System and Hardware Tricks by Garvin Brakel

Part 4 – Securing Public Workstations by Maintaining Software Centrally by Erik J. Biever

Authentication and Authorization

Part 1 – The Changing Role in a Networked Information Environment by Clifford A. Lynch

Part 2 – Tao of Gateway: Providing Internet Access to Licensed Databases by William V. Garrison and Gregory A. McClellan

Part 3 – Decentralized Account Management in a Library Consortium: A Report of HSLC’s Implementation of Guardian by Anita S. Wagner, Alan C. Simon, Cindy A. Pitchon, and Dennis J. Gormley

Part 4 – Using Bluestem for Web User Authentication and Access Control of Library Resources by Timothy W. Cole

Part 5 – The ICAAP Project, Part One: A Continuum of Security Needs for the CIC Virtual Electronic Library by Merri Beth Lavagnino

Part 6 – The ICAAP Project, Part Two: The Web Architecture by Bob Riddle

Part 7 – The ICAAP Project, Part Three: OSF Distributed Computing Environment by Scott Cantor

Security Breaches

Part 1-Things That Go “Bump” in the Virtual Night by Julie A. Fore with sidebars by Dan Simpson, Marshall Breeding, and Julie A. Fore

Part 2 – After the Break-in Occurs: How to Handle the Student Hacker by Scott Muir

Part 3 – To Catch a Hacker by Greg German

Part 4 – Give Yourself a Break; Don’t Give the Hackers One by Jim Rosaschi

PC Articles Worth Noting: January-March 1997 by Walt Crawford

Time for New OPAC Initiatives: An Overview of Landmarks in the Literature and Introduction to WordFocus by Joseph R. Matthews

It is time to move beyond “the same old systems” into a new era that incorporates improvements of a library’s existing databases, embraces the research results of the information-seeking process, and makes fundamental improvements by adding new databases. These new systems should convert the frustrated user of today’s OPAC into the eager user of tomorrow’s local library system.

The Impact of Electronic Information Sources on Collection Development: A Survey of Current Practice by O. Gene Norman

The effects of electronic information sources on collection development in 15 academic libraries is studied, including impacts on the materials budget, collection development policies, and licenses; identifying, evaluating, selecting, and developing the collection; training subject specialists to use electronic resource tools; and the changes in the role of the collection development librarian.

 Authorware for Computer-Assisted Instruction by Chris Niemeyer

Authorware is a sophisticated computer application that is ideal for computer-assisted instruction. The Iowa State University Library has used Authorware extensively for its mandatory library skills class. This article focuses on Authorware features and the methods for learning it, and describes a process for creating a tutorial using this application.

Information Dropshipping by T.D. Webb and Bin Zhang

The appearance of revolutionary information technologies must elicit equivalent responses from the library profession, if for no other reason than simply to provide services that are fast becoming desired and needed by users. Because the implications of the new technology also suggest the possible demise of libraries, it is incumbent on us to make a revolutionary response.

0
  Related Posts