Skip to Main Content
Keywords: Security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Library Review (2008) 57 (9): 746–747.
Published: 10 October 2008
... to be worth analysing or publishing, and extracts of transcribed interviews full of hesitations and repetitions are only of limited interest. The two final chapters – “Overall analysis and interpretation” and “Recommendations for managers, employees and information security professionals” contain the bulk...
Journal Articles
Library Review (2003) 52 (9): 460–461.
Published: 01 December 2003
... Storage Virtual reality Education Security Disaster planning United States of America “Many would consider off‐site storage to be what economists call an inferior good. Who among us wouldn't prefer to build spacious new libraries with perfect climate control and adaptable infrastructure...
Journal Articles
Library Review (2002) 51 (6): 324–326.
Published: 01 August 2002
... to materials with security of materials”. The author provides a valuable service by getting us to look at these issues in a coherent and balanced way. Pamela J.   Cravey . Protecting Library Staff, Users, Collections, and Facilities: A How‐To‐Do‐It Manual for Librarians . New York...
Journal Articles
Library Review (2001) 50 (6): 279–295.
Published: 01 August 2001
... networks. © MCB UP Limited 2001 Information control Security Terrorism War Computer security O, what a tangled web we weave, When first we practise to deceive (Sir Walter Scott). I have two main objectives: the first is to demonstrate how IW – and remember that I am...

or Create an Account

Close Modal
Close Modal