Academic literature on the topic 'Library Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Library Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Library Security"
Latuszek, Thomas. "Library Security." Library & Archival Security 15, no. 2 (June 22, 2000): 3–7. http://dx.doi.org/10.1300/j114v15n02_02.
Full textBahr, Alice Harrison. "Library Security Training." Library & Archival Security 9, no. 1 (April 21, 1989): 37–43. http://dx.doi.org/10.1300/j114v09n01_06.
Full textAbifarin, Amimbola. "Library Stock Security." Library & Archival Security 14, no. 1 (May 15, 1997): 11–19. http://dx.doi.org/10.1300/j114v14n01_02.
Full textLincoln, Alan Jay, and Carol Zall Lincoln. "Patterns of Library Security." Library & Archival Security 8, no. 1-2 (September 9, 1987): 115–43. http://dx.doi.org/10.1300/j114v08n01_05.
Full textChadwick, William E. "Special Collections Library Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 15–31. http://dx.doi.org/10.1300/j111v25n01_03.
Full textTrinkaus-Randall, Gregor. "Library and Archival Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 91–112. http://dx.doi.org/10.1300/j111v25n01_07.
Full textCarey, Jeanne. "Library Security by Design." Library & Archival Security 21, no. 2 (September 11, 2008): 129–40. http://dx.doi.org/10.1080/01960070802201540.
Full textWestenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (September 11, 2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.
Full textSokolov, Arkadiy V. "National Security and National Library." Bibliotekovedenie [Library and Information Science (Russia)] 68, no. 3 (July 27, 2019): 231–47. http://dx.doi.org/10.25281/0869-608x-2019-68-3-231-247.
Full textNielsen, Erland Kolding. "Library Security Management: An Introduction." LIBER Quarterly 12, no. 4 (March 27, 2002): 293. http://dx.doi.org/10.18352/lq.7694.
Full textDissertations / Theses on the topic "Library Security"
Liu, Hao. "Oracle ThinkQuest Library Security Issue Clean-up." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-133629.
Full textSterner, Robert N. "Child support does it provide economic security for single parent families /." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1992. http://www.kutztown.edu/library/services/remote_access.asp.
Full textKrishna, Emir. "Security issues on m-Commerce over 3G/UMTS /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/krishna.doc.
Full textSehdev, Rajat. "Framework for designing and implementing IS/IT information security /." Leeds, 2001. http://www.leeds.ac.uk/library/counter2/compstmsc/20002001/sehdev.doc.
Full textFrame, Ethan Andrew. "GPUHElib and DistributedHElib: Distributed Computing Variants of HElib, a Homomorphic Encryption Library." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1407.
Full textGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Full textMathias, Henry. "Analyzing Small Businesses' Adoption of Big Data Security Analytics." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6614.
Full textPrakash, Aravind. "Confidential Data Dispersion using Thresholding." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/232.
Full textSoldal, Johannes. "Lämna mig ifred : Digital övervakning och personlig integritet på svenska bibliotek." Thesis, Uppsala universitet, Institutionen för ABM, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-307921.
Full textSouza, Fernando Antonio Ferreira de. "Gestão da segurança da informação em bibliotecas: elementos para elaboração de uma política de segurança da informação na Biblioteca Central da Universidade Federal da Paraíba." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9680.
Full textMade available in DSpace on 2017-10-03T16:52:37Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2097465 bytes, checksum: d3bdb832ed8d7ca2faa35f212ab6ca2b (MD5) Previous issue date: 2017-08-02
The information protection has become an extremely critical factor for organizations and Government entities. This involves not only the conventional environment, but also the technological and informational networking infrastructure. This study set out to address the information security as part of a University Library context. Even though a familiar environment with the information management processes, the libraries come suffering with problems related to lack of information on security management. For this purpose, this research studies the elements of information security management that allow the elaboration of a minute of information security policy for the Central Library of the Federal University of Paraíba. As the methodological aspects, is characterized as qualitative, descriptive type. As instrument methodology of data collection, tabulation and analysis, uses the Facilitated Process of risk analysis and assessment (FRAAP), which was supplemented with quiz and analysis of content according to Bardin. The results indicat a group of fifteen threats, among which detected nine physical threats, two logical threats and four threats related to processes. Finally, it was found that the Central Library of UFPB needs to reflect on an action plan directed to information security, to guarantee the confidentiality, integrity and safeguard of the organization's critical management information. With the results, it is expected to contribute with information security in the context of the Central Library of UFPB with the proposed minute information security policy, enabling new contributions to the development of the processes of management of the University Library.
A proteção da informação tornou-se fator de extrema criticidade para as organizações e entidades de governo. Esta envolve não somente o ambiente convencional, mas a infraestrutura tecnológica e de redes informacionais. Este estudo se propôs abordar a Segurança da Informação no âmbito de uma biblioteca universitária. Mesmo sendo um ambiente familiarizado com os processos de gestão da informação, as bibliotecas vêm sofrendo com os problemas relacionados à falta de gestão da segurança da informação. Para tanto, esta pesquisa estuda os elementos de Gestão da Segurança da Informação que permitam a elaboração de uma minuta de Política de Segurança da Informação para a Biblioteca Central da Universidade Federal da Paraíba. Quanto os aspectos metodológicos, se caracteriza como qualitativa, do tipo descritiva. Como instrumento metodológico de coleta de dados, tabulação e análise, utiliza o Processo Facilitado de Análise e Avaliação de Risco (FRAAP), que foi complementado com questionário e a análise de conteúdo conforme Bardin. Os resultados apresentados indicam um grupo de quinze ameaças, dentre as quais se detectou nove ameaças físicas, duas ameaças lógicas e quatro ameaças relacionadas aos processos gerenciais. Por fim, verifica-se que a Biblioteca Central da UFPB necessita refletir sobre um plano de ação direcionado à segurança da informação, para a garantia de confidencialidade, integridade e salvaguarda das informações gerenciais críticas da organização. Com os resultados, espera-se contribuir com a Segurança da Informação no âmbito da Biblioteca Central da UFPB com uma proposta de minuta para Política de Segurança da Informação, permitindo novas contribuições para o desenvolvimento dos processos de gestão da Biblioteca Universitária.
Books on the topic "Library Security"
Office, National Preservation. Security matters: Carrying out a library security survey & drafting a security policy. London: National Preservation Office, British Library, 1992.
Find full textBrady, Eileen. Library/archive/museum security: A bibliography. 5th ed. Moscow, Idaho: Catula Pinguis Press, 1995.
Find full textZall, Lincoln Carol, ed. Library crime and security: An international perspective. New York: Haworth Press, 1987.
Find full textSwitzer, Teri R. Safe at work?: Library security and safety issues. Lanham, Md: Scarecrow Press, 1999.
Find full textUniversity, of California Los Angeles Library. Patron relations: A manual for library staff. [Los Angeles, Calif.]: UCLA Libraries, 1986.
Find full textShuman, Bruce A. Library security and safety handbook: Prevention, policies, and procedures. Chicago: American Library Association, 1999.
Find full textLibrary security and safety guide to prevention, planning, and response. Chicago: Amer Library Association, 2007.
Find full textSaltalamachia, Joyce. Professional staffing and job security in the academic law library. London: Glanville Publishers, 1988.
Find full textBook chapters on the topic "Library Security"
Becker, George, and Kathy Slattery. "Security." In Sun Technical Reference Library, 231–40. New York, NY: Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4419-8716-7_6.
Full textRumley, Dennis. "Regional Security Relations." In The GeoJournal Library, 166–78. Dordrecht: Springer Netherlands, 2001. http://dx.doi.org/10.1007/978-94-011-4529-9_12.
Full textRusso, Michael. "System Security." In Sun Technical Reference Library, 185–89. New York, NY: Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-3000-7_14.
Full textAlrabaee, Saed, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, and Aiman Hanna. "Library Function Identification." In Advances in Information Security, 79–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34238-8_4.
Full textBrüggemann-Klein, A., and C. Haber. "The MeDoc library: Security aspects." In Digital Libraries in Computer Science: The MeDoc Approach, 103–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0052517.
Full textPinchinat, Sophie, François Schwarzentruber, and Sébastien Lê Cong. "Library-Based Attack Tree Synthesis." In Graphical Models for Security, 24–44. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_2.
Full textKolhe, Shivam, Sonia Nagpal, and Jesal Desai. "Security in Internet of Things." In Intelligent Systems Reference Library, 279–90. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32644-9_29.
Full textDhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "IoT Security: A Comprehensive View." In Intelligent Systems Reference Library, 467–94. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33596-0_19.
Full textTaylor, Bradley. "A Framework for Network Security." In Sun Technical Reference Library, 147–52. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4612-3334-3_11.
Full textMalcolm, James A. "Blind Publication: A Copyright Library without Publication or Trust." In Security Protocols, 336–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_41.
Full textConference papers on the topic "Library Security"
Colquitt, Michelle E. "The Sun Shining in the Middle of the Night: How Moving Beyond IP Authentication Does Not Spoil the Fun, Ease, or Privacy of Accessing Library Resources." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317204.
Full textMattern Büttiker, Sharon M., James King, Susie Winter, and Crane Hassold. "Should You Pay for the Chicken When You Can Get It for Free? No Longer Life on the Farm as We Know It." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317182.
Full textErickson, David, and Tie Peng. "libdrdc: software standards library." In SPIE Defense and Security Symposium, edited by Grant R. Gerhart, Douglas W. Gage, and Charles M. Shoemaker. SPIE, 2008. http://dx.doi.org/10.1117/12.773976.
Full textEhlers, Johan Hendrik, and Sabah A. Jassim. "Wavelet library for constrained devices." In Defense and Security Symposium, edited by Sos S. Agaian and Sabah A. Jassim. SPIE, 2007. http://dx.doi.org/10.1117/12.720713.
Full textRinaldi, Filipe, and Matt Spencer. "Arm DDS Security library: Adding secure security to ROS2." In ROSCon2018. Mountain View, CA: Open Robotics, 2018. http://dx.doi.org/10.36288/roscon2018-900294.
Full textRinaldi, Filipe, and Matt Spencer. "Arm DDS Security library: Adding secure security to ROS2." In ROSCon2018. Mountain View, CA: Open Robotics, 2018. http://dx.doi.org/10.36288/roscon2018-900838.
Full textHongchang, Wei, Wang Qian, and Wu Xuefang. "The Security Design of Digital Library." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.92.
Full textJiankun, Sun. "Security Architecture of Digital Library Research." In 2011 International Conference on Intelligence Science and Information Engineering (ISIE). IEEE, 2011. http://dx.doi.org/10.1109/isie.2011.151.
Full textErlianti, Gustina, Riya Fatmawati, and Dadi Satria. "Security System for Collectio In Library." In Proceedings of the International Conference on Language, Literature, and Education (ICLLE 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/iclle-18.2018.94.
Full textVaishnav, Anuj, Jose Raul Garcia Ordaz, and Dirk Koch. "A security library for FPGA interlays." In 2017 27th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2017. http://dx.doi.org/10.23919/fpl.2017.8056817.
Full textReports on the topic "Library Security"
Simic, Bojan, Arshan Dabirsiaghi, and Jeff Williams. Library Code Security Analysis. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada589844.
Full textGarfinkel, Simson L. Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools. Fort Belvoir, VA: Defense Technical Information Center, August 2008. http://dx.doi.org/10.21236/ada485606.
Full textSteeves, Brye. Classified library critical in Lab’s Annual Assessment of weapons to U.S. President National Security Resource Center’s collections are the foundation to stockpile confidence By the National Security Research Center staff. Office of Scientific and Technical Information (OSTI), March 2021. http://dx.doi.org/10.2172/1773326.
Full text