Journal articles on the topic 'Library Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Library Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Latuszek, Thomas. "Library Security." Library & Archival Security 15, no. 2 (June 22, 2000): 3–7. http://dx.doi.org/10.1300/j114v15n02_02.
Full textBahr, Alice Harrison. "Library Security Training." Library & Archival Security 9, no. 1 (April 21, 1989): 37–43. http://dx.doi.org/10.1300/j114v09n01_06.
Full textAbifarin, Amimbola. "Library Stock Security." Library & Archival Security 14, no. 1 (May 15, 1997): 11–19. http://dx.doi.org/10.1300/j114v14n01_02.
Full textLincoln, Alan Jay, and Carol Zall Lincoln. "Patterns of Library Security." Library & Archival Security 8, no. 1-2 (September 9, 1987): 115–43. http://dx.doi.org/10.1300/j114v08n01_05.
Full textChadwick, William E. "Special Collections Library Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 15–31. http://dx.doi.org/10.1300/j111v25n01_03.
Full textTrinkaus-Randall, Gregor. "Library and Archival Security." Journal of Library Administration 25, no. 1 (March 13, 1998): 91–112. http://dx.doi.org/10.1300/j111v25n01_07.
Full textCarey, Jeanne. "Library Security by Design." Library & Archival Security 21, no. 2 (September 11, 2008): 129–40. http://dx.doi.org/10.1080/01960070802201540.
Full textWestenkirchner, Suzy. "Integrated Library Security Systems." Library & Archival Security 21, no. 2 (September 11, 2008): 159–67. http://dx.doi.org/10.1080/01960070802201789.
Full textSokolov, Arkadiy V. "National Security and National Library." Bibliotekovedenie [Library and Information Science (Russia)] 68, no. 3 (July 27, 2019): 231–47. http://dx.doi.org/10.25281/0869-608x-2019-68-3-231-247.
Full textNielsen, Erland Kolding. "Library Security Management: An Introduction." LIBER Quarterly 12, no. 4 (March 27, 2002): 293. http://dx.doi.org/10.18352/lq.7694.
Full textBeisler, Lynn, Janet Hill, Mandy Janjigian, David Murphy, and Joanne Schmidt. "Emerson College Library Security Guidelines." Library & Archival Security 10, no. 1 (August 10, 1990): 43–54. http://dx.doi.org/10.1300/j114v10n01_04.
Full textArndt, Donald A. "Problem Patrons and Library Security." Legal Reference Services Quarterly 19, no. 1-2 (May 2001): 19–40. http://dx.doi.org/10.1300/j113v19n01_03.
Full textArcand, Janet. "Security and the digital library." Library Collections, Acquisitions, & Technical Services 24, no. 2 (June 2000): 344–46. http://dx.doi.org/10.1080/14649055.2000.10765683.
Full textEwing, David. "Library Security in the UK." Library Management 15, no. 2 (March 1994): 18–26. http://dx.doi.org/10.1108/01435129410052409.
Full textRasslan, Mohamed, Mahmoud Nasreldin, Ghada Elkabbany, and Aya Elshobaky. "On the Security of the Sensor Cloud Security Library (SCSlib)." Journal of Computer Science 14, no. 6 (June 1, 2018): 793–803. http://dx.doi.org/10.3844/jcssp.2018.793.803.
Full textAlemna, Anaba. "Library Security, Book Theft and Mutilation." Library & Archival Security 11, no. 2 (January 26, 1993): 23–35. http://dx.doi.org/10.1300/j114v11n02_02.
Full textSmith, Frederick E. "Questionable Strategies in Library Security Studies." Library & Archival Security 6, no. 4 (February 20, 1985): 43–53. http://dx.doi.org/10.1300/j114v06n04_05.
Full textCalvert, Philip. "Library Security: Better Communication, Safer Facilities." Electronic Library 34, no. 3 (June 6, 2016): 550–51. http://dx.doi.org/10.1108/el-11-2015-0227.
Full textKetchum, David. "Library Security: Better Communication, Safer Facilities." Journal of Access Services 14, no. 3 (February 22, 2017): 159–60. http://dx.doi.org/10.1080/15367967.2017.1290531.
Full textZhao, Li, and Yun Zi. "The Network Security Management Problem of Library." Advanced Materials Research 760-762 (September 2013): 1241–43. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1241.
Full textShafack, Rosemary M. "Securing Library and Information Resources: The Situation in Two State University Libraries in Cameroon." European Journal of Education and Pedagogy 2, no. 1 (January 11, 2021): 25–31. http://dx.doi.org/10.24018/ejedu.2021.2.1.13.
Full textZhou, Xiao Yan, Zhi Hua Hu, and Jian Kun Shun. "Security Architecture of Digital Library Research in General Knowledge Environment." Applied Mechanics and Materials 198-199 (September 2012): 601–5. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.601.
Full textSun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.
Full textForrest, Dan. "Book Review: Case Studies in Library Security." Library Resources & Technical Services 49, no. 4 (October 1, 2005): 287–88. http://dx.doi.org/10.5860/lrts.49n4.287.
Full textLincoln, Alan Jay. "Library Legislation Related to Crime and Security." Library & Archival Security 10, no. 2 (January 24, 1991): 77–101. http://dx.doi.org/10.1300/j114v10n02_05.
Full textLincoln, Alan Jay. "Library Legislation Related to Crime and Security." Library & Archival Security 11, no. 1 (August 26, 1991): 71–101. http://dx.doi.org/10.1300/j114v11n01_06.
Full textLincoln, Alan Jay. "Library Legislation Related to Crime and Security." Library & Archival Security 11, no. 2 (January 26, 1993): 37–48. http://dx.doi.org/10.1300/j114v11n02_03.
Full textNicewamer, Metta, and Shelley Heaton. "Providing Security in an Urban Academic Library." Library & Archival Security 13, no. 1 (September 7, 1995): 9–19. http://dx.doi.org/10.1300/j114v13n01_02.
Full textHarwell, Jonathan H. "Library Security Gates: Effectiveness and Current Practice." Journal of Access Services 11, no. 2 (April 3, 2014): 53–65. http://dx.doi.org/10.1080/15367967.2014.884876.
Full textWang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.
Full textSan Nicolas-Rocca, Tonia, and Richard J. Burkhard. "Information Security in Libraries." Information Technology and Libraries 38, no. 2 (June 17, 2019): 58–71. http://dx.doi.org/10.6017/ital.v38i2.10973.
Full textWang, Hai Xia. "Study on the Security Strategy of Digital Information – Take our School Library as an Example." Applied Mechanics and Materials 526 (February 2014): 367–71. http://dx.doi.org/10.4028/www.scientific.net/amm.526.367.
Full textLiu, Shuang. "Design of Network System Security System of Digital Library." Applied Mechanics and Materials 644-650 (September 2014): 3212–15. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3212.
Full textCalix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security." Information 11, no. 2 (February 11, 2020): 100. http://dx.doi.org/10.3390/info11020100.
Full textClark, Sarah. "Book Review: Library Security: Better Communication, Safer Facilities." Reference & User Services Quarterly 55, no. 3 (March 24, 2016): 245. http://dx.doi.org/10.5860/rusq.55n3.245.
Full textRobles, Patricia A. "Security upon moving into a new library building." College & Research Libraries News 57, no. 7 (July 1, 1996): 427–30. http://dx.doi.org/10.5860/crln.57.7.427.
Full textCain, Mark. "Cybertheft, network security, and the library without walls." Journal of Academic Librarianship 29, no. 4 (July 2003): 245–48. http://dx.doi.org/10.1016/s0099-1333(03)00043-0.
Full textZhenning, Yang, Wang Kai, Zhang Liuyang, G. Siva Shanmugam, Ronnie D. Caytiles, and N. Ch S. N. Iyengar. "Library Cloud: Concept and Design with Security Features." International Journal of Software Engineering and Its Applications 11, no. 1 (January 31, 2017): 17–28. http://dx.doi.org/10.14257/ijseia.2017.11.1.02.
Full textJohansson, David. "Library Material Theft, Mutilation, and Preventive Security Measures." Public Library Quarterly 15, no. 4 (October 1996): 51–66. http://dx.doi.org/10.1300/j118v15n04_10.
Full textBrown-Syed, Christopher. "Library & Archival Security in the Next Century." Library & Archival Security 14, no. 2 (August 18, 1998): 1–4. http://dx.doi.org/10.1300/j114v14n02_01.
Full textPetruželková, Alena. "A Personal Library Screened by the State Security." Acta Musei Nationalis Pragae – Historia litterarum 61, no. 1-2 (September 1, 2016): 93–98. http://dx.doi.org/10.1515/amnpsc-2017-0024.
Full textIsmail, Roesnita, and Awang Ngah Zainab. "Assessing the status of library information systems security." Journal of Librarianship and Information Science 45, no. 3 (March 11, 2013): 232–47. http://dx.doi.org/10.1177/0961000613477676.
Full textAnderson, Laura Challman, and Jeffrey B. Lotspiech. "Rights Management and Security in the Electronic Library." Bulletin of the American Society for Information Science and Technology 22, no. 1 (January 31, 2005): 21–23. http://dx.doi.org/10.1002/bult.8.
Full text李, 若影. "Security Analysis and Verification of the Game Library." Computer Science and Application 08, no. 08 (2018): 1277–91. http://dx.doi.org/10.12677/csa.2018.88138.
Full textLashley, Edwin L. "Library Safety and Security—Campus/Community Police Collaboration." Library & Archival Security 21, no. 2 (September 11, 2008): 195–201. http://dx.doi.org/10.1080/01960070802202027.
Full textAntwi, I. K. "The problem of library security: The Bauchi experience." International Library Review 21, no. 3 (July 1989): 363–72. http://dx.doi.org/10.1016/0020-7837(89)90046-0.
Full textNjoku, Lazarus C., and Eucharia Ken-Agbiriogu. "Towards enhancing national security in Nigeria: The roles of library." Library and Information Perspectives and Research 2, no. 1 (January 2020): 60–70. http://dx.doi.org/10.47524/liprv2i1.5.
Full textHan, Zhengbiao, Shuiqing Huang, Huan Li, and Ni Ren. "Risk assessment of digital library information security: a case study." Electronic Library 34, no. 3 (June 6, 2016): 471–87. http://dx.doi.org/10.1108/el-09-2014-0158.
Full textEvans, G. Edward. "Library Security and Safety Handbook20002Bruce A. Shuman. Library Security and Safety Handbook. Chicago, IL: American Library Association 1999. , ISBN: ISBN 0 8389 0714 8 £30.50 paperback." Library Management 21, no. 2 (March 2000): 109–15. http://dx.doi.org/10.1108/lm.2000.21.2.109.2.
Full textAnday, Audrey, Enrico Francese, Hugo C. Huurdeman, Muharrem Yılmaz, and Dydimus Zengenene. "Information Security Issues in a Digital Library Environment: A Literature Review." Bilgi Dünyası 13, no. 1 (April 30, 2012): 117–37. http://dx.doi.org/10.15612/bd.2012.171.
Full text