Securing Library Technology

Ina Fourie (University of Pretoria)

Library Hi Tech

ISSN: 0737-8831

Article publication date: 2 March 2012

191

Citation

Fourie, I. (2012), "Securing Library Technology", Library Hi Tech, Vol. 30 No. 1, pp. 194-194. https://doi.org/10.1108/07378831211213300

Publisher

:

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited


With Securing Library Technology, Paul Earp and Adam Wright succeed in offering a practical guide to dealing with a variety of security issues concerning library technology. These include integrated library systems as well as desktop/laptop computers.

The book consists of 11 chapters and two appendices. The chapters include an overview of library technology, typical library security principles, performing a technology inventory and creating a network security policy. The last is a substantial chapter covering aspects of a written policy such as classifying information, server policy, staff technology policy, public technology policy and network policy (including wireless access). There are also chapters on dealing with threats from hackers and malcontents, planning for security implementation and auditing weaknesses, implementing policies for secure public technology, developing security for library office technology, establishing server security, and securing the library network from external as well as internal threats. Under external threats there is good coverage of firewall precautions.

Appendix A offers links to state laws on cyber and computer crime, and Appendix B to vendor or software websites. In addition there is an extensive 23‐page glossary and a good index.

It is clear that the authors put effort into a clear, well‐written and well‐structured publication that can offer the practicing librarian solutions to security issues at a glance. Securing Library Technology takes a fairly comprehensive approach to the security issues faced by libraries. In addition each chapter is appropriately supported with figures, diagrams, and explanations on the side. It concludes with a summary of key points and summaries capturing the key message of the chapters, as well as references to sources for further reading and a list of review questions. The list of references might perhaps have been a bit more comprehensive, but is adequate as it stands.

Securing Library Technology is highly recommended to any librarian who needs to take care of technological security, and especially those in management and decision‐making positions.

Related articles