nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Case Study of Periodical Mutilation in a University Serials Collection
|
Atwood, Thomas |
|
1990 |
|
1 |
p. 35-41 |
artikel |
2 |
A Decade of Disaster
|
Kulczak, Deb |
|
1999 |
|
1 |
p. 7-66 |
artikel |
3 |
Advance Fee Frauds— Alerting Library Patrons
|
|
|
2006 |
|
1 |
p. 59-61 |
artikel |
4 |
Analysis of Inventory Losses from Long Beach Public Library
|
Burnett, Claudine |
|
1990 |
|
1 |
p. 3-33 |
artikel |
5 |
An Exploratory Survey of Book Loss, Theft and Damage in Abubakar Tafawa Balewa University (ATBU), Bauchi, Nigeria
|
Abareh, H. M. |
|
2001 |
|
1 |
p. 33-42 |
artikel |
6 |
Annotated Bibliography on Book Theft
|
Ringelstein, Albert C. |
|
1978 |
|
1 |
p. 15-18 |
artikel |
7 |
A Psocid by Any Other Name. . .(Is Still a Pest)
|
Weinstein, Frances Ruth |
|
1984 |
|
1 |
p. 57-63 |
artikel |
8 |
Are Our Libraries Safe from Losses?
|
Ungarelli, Donald L. |
|
1991 |
|
1 |
p. 117-123 |
artikel |
9 |
Are Our Libraries Safe from Losses?
|
Ungarelli, Donald L. |
|
1990 |
|
1 |
p. 55-58 |
artikel |
10 |
Are Our Libraries Safe from Losses?
|
Ungarelli, Donald L. |
|
1989 |
|
1 |
p. 45-48 |
artikel |
11 |
A Rose Is Not Necessarily a Rose
|
Kamm, Sue |
|
1995 |
|
1 |
p. 41-45 |
artikel |
12 |
A Security Flaw in Barcode Self-Charging Systems
|
Khong, W. K. |
|
1999 |
|
1 |
p. 91-94 |
artikel |
13 |
Attacking the Problem - Self Assessment
|
Cote, William C. |
|
1991 |
|
1 |
p. 125-156 |
artikel |
14 |
A Workshop Approach to Library Security
|
Cronin, Mary J. |
|
1980 |
|
1 |
p. 49-56 |
artikel |
15 |
BAMBAM Update, December 1983
|
Leab, Katherine Kyes |
|
1984 |
|
1 |
p. 75-108 |
artikel |
16 |
BAMBAM Update, 1982-May, 1983
|
Leab, Katherine Kyes |
|
1983 |
|
1 |
p. 47-138 |
artikel |
17 |
Binding for Bookstock Integrity in a Nigerian University Library
|
Ogunrombi, Samuel Adewale |
|
2006 |
|
1 |
p. 39-45 |
artikel |
18 |
Biological Factors in Paper Deterioration in Nigeria
|
Enzennia, Steve E. |
|
1991 |
|
1 |
p. 103-107 |
artikel |
19 |
Book Mutilation
|
Watstein, Sarah Barbara |
|
1983 |
|
1 |
p. 11-33 |
artikel |
20 |
BOOK REVIEW
|
|
|
2003 |
|
1 |
p. 63-64 |
artikel |
21 |
BOOK REVIEWS
|
|
|
2000 |
|
1 |
p. 83-84 |
artikel |
22 |
BOOK REVIEWS
|
|
|
2001 |
|
1 |
p. 71-77 |
artikel |
23 |
BOOK REVIEWS
|
|
|
2006 |
|
1 |
p. 73-81 |
artikel |
24 |
Briefly Noted
|
Desroches, Richard |
|
1990 |
|
1 |
p. 127 |
artikel |
25 |
Care and Storage of Works on Paper
|
Brandt, Charles A. E. |
|
1983 |
|
1 |
p. 1-10 |
artikel |
26 |
Charging Patrons for Lost or Damaged Books
|
Alao, I. A. |
|
1999 |
|
1 |
p. 67-74 |
artikel |
27 |
Cheaper than the Holiday Inn
|
Shuman, Bruce A. |
|
1995 |
|
1 |
p. 47-60 |
artikel |
28 |
Community Crime Prevention
|
Lincoln, Alan Jay |
|
1989 |
|
1 |
p. 49-58 |
artikel |
29 |
Computer Security
|
Lincoln, Alan Jay |
|
1991 |
|
1 |
p. 157-171 |
artikel |
30 |
Controlling the Human Element
|
Cote, William C. |
|
1990 |
|
1 |
p. 67-75 |
artikel |
31 |
Copyrighted Software and Infringement by Libraries
|
Shuman, Bruce A. |
|
1989 |
|
1 |
p. 29-36 |
artikel |
32 |
Dealing with Book Loss in an Academic Library
|
Luurtsema, David |
|
1997 |
|
1 |
p. 21-27 |
artikel |
33 |
Determining a Fair Price for Lost Books
|
Treadwell, Jane |
|
1989 |
|
1 |
p. 19-26 |
artikel |
34 |
Determining Authoritiveness on the Web
|
Brown-Syed, Christopher |
|
2001 |
|
1 |
p. 43-70 |
artikel |
35 |
Developing A Library Insurance Program:
|
Kenneweg, Richard |
|
1978 |
|
1 |
p. 111-114 |
artikel |
36 |
Door Checkers
|
Smith, Frederick E. |
|
1985 |
|
1 |
p. 7-13 |
artikel |
37 |
Drug Abuse and Library Resources in Nigeria
|
Ezennia, Steve E. |
|
1994 |
|
1 |
p. 35-45 |
artikel |
38 |
Dusty, Tweedy, Bespectacled Nuisances
|
Brown-Syed, Christopher |
|
2000 |
|
1 |
p. 5-6 |
artikel |
39 |
EDITORIAL
|
Shuman, B. A. |
|
1994 |
|
1 |
p. 1-5 |
artikel |
40 |
EDITORIAL
|
Shuman, Bruce A. |
|
1995 |
|
1 |
p. 1-7 |
artikel |
41 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
1999 |
|
1 |
p. 1-2 |
artikel |
42 |
Editors' Introduction
|
Lincoln, Alan Jay |
|
1990 |
|
1 |
p. 1-2 |
artikel |
43 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2000 |
|
1 |
p. 1-3 |
artikel |
44 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2001 |
|
1 |
p. 1-2 |
artikel |
45 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2006 |
|
1 |
p. 1-2 |
artikel |
46 |
EDITOR'S INTRODUCTION
|
|
|
2008 |
|
1 |
p. 1 |
artikel |
47 |
Editors' Introduction
|
Lincoln, Alan Jay |
|
1989 |
|
1 |
p. 1 |
artikel |
48 |
EDITOR'S INTROD UCTION
|
Brown-Syed, Christopher |
|
2003 |
|
1 |
p. 1-2 |
artikel |
49 |
Electronic Collection Security Systems Today
|
Bahr, Alice Harrison |
|
1991 |
|
1 |
p. 3-22 |
artikel |
50 |
ELECTRONIC SECURITY IN DOLLARS & CENTS
|
Roberts, Matt |
|
1975 |
|
1 |
p. 1-3 |
artikel |
51 |
Electronic Theft Detection Systems: A Survey Conducted in 1976
|
Romeo, Louis J. |
|
1980 |
|
1 |
p. 1-23 |
artikel |
52 |
Emerson College Library Security Guidelines
|
Beisler, Lynn |
|
1990 |
|
1 |
p. 43-54 |
artikel |
53 |
FileMaker Pro 7
|
Yerkey, A. Neil |
|
2006 |
|
1 |
p. 15-27 |
artikel |
54 |
FIRE HAZARDS IN LIBRARIES
|
Harvey, Bruce |
|
1975 |
|
1 |
p. 4 |
artikel |
55 |
Flood, Earthquake, Libraries and Library Materials
|
Ezennia, Steve E. |
|
1995 |
|
1 |
p. 21-27 |
artikel |
56 |
From the Editor's Desk
|
Submission, Haworth Continuing Features |
|
1978 |
|
1 |
p. 4-7 |
artikel |
57 |
Imaging the Archives
|
Cory, Kenneth A. |
|
1994 |
|
1 |
p. 7-15 |
artikel |
58 |
Impoving Library Conservation
|
Morrison, Robert C. |
|
1978 |
|
1 |
p. 8-10 |
artikel |
59 |
Integrating Conservation and Collection Management
|
McCrank, Lawrence J. |
|
1984 |
|
1 |
p. 23-48 |
artikel |
60 |
Internal Control Implications in a University Library Environment
|
Mounce, Michael |
|
2008 |
|
1 |
p. 13-20 |
artikel |
61 |
Introduction
|
Bahr, Alice Harrison |
|
1991 |
|
1 |
p. 1-2 |
artikel |
62 |
Is There a Klepto in the Stacks?
|
Hamilton, John Maxwell |
|
1994 |
|
1 |
p. 47-54 |
artikel |
63 |
LAS Preservation
|
Frusciano, Thomas J. |
|
1985 |
|
1 |
p. 101-107 |
artikel |
64 |
Law Enforcement Agencies and Library Records
|
Brown-Syed, Christopher |
|
2006 |
|
1 |
p. 53-57 |
artikel |
65 |
Legal and Ethical Issues
|
Submission, Haworth Continuing Features |
|
1989 |
|
1 |
p. 27 |
artikel |
66 |
Legal Liabilities in the Handling of Problem Patrons
|
Gudsen, Neil |
|
2001 |
|
1 |
p. 17-31 |
artikel |
67 |
Library Arson
|
Submission, Haworth Continuing Features |
|
1978 |
|
1 |
p. 1-3 |
artikel |
68 |
Library Crime and Security in Academic Libraries in Texas
|
Chavez, Alice M. |
|
1994 |
|
1 |
p. 55-78 |
artikel |
69 |
Library Legislation Related to Crime and Security
|
Lincoln, Alan Jay |
|
1991 |
|
1 |
p. 71-101 |
artikel |
70 |
Library Pests
|
Thompson, Lawrence S. |
|
1985 |
|
1 |
p. 15-24 |
artikel |
71 |
Library Security
|
Submission, Haworth Continuing Features |
|
1975 |
|
1 |
p. 10-11 |
artikel |
72 |
Library Security Information and National Institute of Justice Clearinghouses
|
Bahr, Alice Harrison |
|
1990 |
|
1 |
p. 59-66 |
artikel |
73 |
Library Security Training
|
Bahr, Alice Harrison |
|
1989 |
|
1 |
p. 37-43 |
artikel |
74 |
Library Stock Security
|
Abifarin, Amimbola |
|
1997 |
|
1 |
p. 11-19 |
artikel |
75 |
Malware
|
|
|
2006 |
|
1 |
p. 71-72 |
artikel |
76 |
Material Selection for Library Conservation
|
Holland, Michael E. |
|
1984 |
|
1 |
p. 7-21 |
artikel |
77 |
Military Librarians—A Group Overlooked?
|
Brown-Syed, Christopher |
|
2008 |
|
1 |
p. 47-56 |
artikel |
78 |
Missing Links
|
Freese, Melanie L. |
|
1989 |
|
1 |
p. 3-17 |
artikel |
79 |
Mold Abatement in a Remote Storage Facility
|
Smith, Elizabeth H. |
|
1999 |
|
1 |
p. 75-82 |
artikel |
80 |
National Register of Lost or Stolen Archival Materials
|
Submission, Haworth Continuing Features |
|
1980 |
|
1 |
p. 67-71 |
artikel |
81 |
New Products
|
Submission, Haworth Continuing Features |
|
1978 |
|
1 |
p. 24-27 |
artikel |
82 |
New Products
|
Submission, Haworth Continuing Features |
|
1975 |
|
1 |
p. 14 |
artikel |
83 |
NEW PRODUCTS
|
Submission, Haworth Continuing Features |
|
1980 |
|
1 |
p. 72-75 |
artikel |
84 |
NEW REFLECTIONS ON BIBLIOKLEPTOMANIA
|
Thompson, Lawrence S. |
|
1975 |
|
1 |
p. 8-9 |
artikel |
85 |
New Security Measures at Hahnville
|
Strother, Garland |
|
1980 |
|
1 |
p. 63-65 |
artikel |
86 |
Notes from the Field
|
Submission, Haworth Continuing Features |
|
1990 |
|
1 |
p. 99-112 |
artikel |
87 |
Of Floods, Fans & Freeze Driers
|
Entwisle, Rosemary |
|
1983 |
|
1 |
p. 35-39 |
artikel |
88 |
People in Libraries as Security Agents
|
Sheridan, Leslie W. |
|
1980 |
|
1 |
p. 57-61 |
artikel |
89 |
P.E.S.T. (Problem Eradicator Service Technology)
|
Horak, Daniel |
|
1997 |
|
1 |
p. 75-80 |
artikel |
90 |
Policies to Protect Information Systems
|
Thompson, Samuel T. C. |
|
2006 |
|
1 |
p. 3-14 |
artikel |
91 |
Political Conflicts and Sri Lankan Libraries
|
Gamage, Premila |
|
2003 |
|
1 |
p. 43-51 |
artikel |
92 |
Preserving the Past: An Overview
|
Mostyn, Kristine |
|
2008 |
|
1 |
p. 33-45 |
artikel |
93 |
Preventing Theft in Academic Libraries and Special Collections
|
Allen, Susan M. |
|
1997 |
|
1 |
p. 29-43 |
artikel |
94 |
Providing Security in an Urban Academic Library
|
Nicewamer, Metta |
|
1995 |
|
1 |
p. 9-19 |
artikel |
95 |
Quake, Rattle, and Roll
|
Watson, Adele L. |
|
1984 |
|
1 |
p. 1-5 |
artikel |
96 |
Radio Frequency ID Development and Debate Continue
|
|
|
2006 |
|
1 |
p. 69-70 |
artikel |
97 |
Readers' Questions
|
Submission, Haworth Continuing Features |
|
1990 |
|
1 |
p. 113-119 |
artikel |
98 |
Reducing Personal Crimes
|
Lincoln, Alan Jay |
|
1990 |
|
1 |
p. 77-98 |
artikel |
99 |
Re-Establishing Key Control as a Security Measure
|
Teper, Tom |
|
2003 |
|
1 |
p. 53-61 |
artikel |
100 |
Report on the Society of American Archivists Annual Meeting, Minneapolis, October 5-8, 1983
|
Neilon, Barbara L. |
|
1984 |
|
1 |
p. 65-66 |
artikel |
101 |
Reviews
|
Lincoln, Carol Zall |
|
1990 |
|
1 |
p. 121-126 |
artikel |
102 |
REVIEWS
|
Neilon, Barbara L. |
|
1983 |
|
1 |
p. 41-45 |
artikel |
103 |
REVIEWS
|
Neilon, Barbara L. |
|
1984 |
|
1 |
p. 67-74 |
artikel |
104 |
REVIEWS
|
Submission, Haworth Continuing Features |
|
1985 |
|
1 |
p. 99-100 |
artikel |
105 |
Reviews
|
Submission, Haworth Continuing Features |
|
1989 |
|
1 |
p. 59-63 |
artikel |
106 |
Ripoffs Revisited
|
Lilly, Roy S. |
|
1991 |
|
1 |
p. 43-70 |
artikel |
107 |
Same Story … Different Day
|
Layne, Stevan P. |
|
1997 |
|
1 |
p. 45-51 |
artikel |
108 |
School Library Security
|
Submission, Haworth Continuing Features |
|
1975 |
|
1 |
p. 12-13 |
artikel |
109 |
School Library Theft
|
Paris, Janelle A. |
|
1980 |
|
1 |
p. 29-38 |
artikel |
110 |
Securing Our History
|
Janus, Kristin M. |
|
2001 |
|
1 |
p. 3-15 |
artikel |
111 |
Security Digest
|
Submission, Haworth Continuing Features |
|
1978 |
|
1 |
p. 19-23 |
artikel |
112 |
Security of Academic Library Buildings
|
Brand, Marvine |
|
1980 |
|
1 |
p. 39-47 |
artikel |
113 |
Security Systems Protect Audiovisual Materials
|
Scherdin, Mary Jane |
|
1991 |
|
1 |
p. 23-34 |
artikel |
114 |
Selecting Library Materials for Preservation
|
Tomer, Christinger |
|
1985 |
|
1 |
p. 1-6 |
artikel |
115 |
Serials Mutilation Hazard at the University of Dar es Salaam Library in Tanzania
|
Msuya, Jangawe |
|
1991 |
|
1 |
p. 109-116 |
artikel |
116 |
Some Observations on Systematic Book Theft
|
Brown-Syed, Christopher |
|
1999 |
|
1 |
p. 83-89 |
artikel |
117 |
Sound Advice for Art Collectors
|
|
|
2000 |
|
1 |
p. 79-81 |
artikel |
118 |
Supplementary Deterrents in Library Security
|
Smith, Frederick E. |
|
1984 |
|
1 |
p. 49-56 |
artikel |
119 |
Technological Terrors of the Year 2000
|
Brown-Syed, Christopher |
|
1999 |
|
1 |
p. 3-6 |
artikel |
120 |
The Battle for Preservation of Library Materials in Nigeria
|
Ezennia, Steve E. |
|
1995 |
|
1 |
p. 29-39 |
artikel |
121 |
The Blumberg Case and Its Implications for Library Security at the Central University Libraries, Southern Methodist University
|
Vitale, Cammie |
|
1994 |
|
1 |
p. 79-85 |
artikel |
122 |
The Changing Faces of Library Privacy
|
Brown-Syed, Christopher |
|
2003 |
|
1 |
p. 3-8 |
artikel |
123 |
The Devious, the Distraught and the Deranged
|
Shuman, Bruce A. |
|
1997 |
|
1 |
p. 53-73 |
artikel |
124 |
The Effectiveness of Library Measures Against Theft and Mutilation
|
Alao, I. A. |
|
2006 |
|
1 |
p. 29-37 |
artikel |
125 |
The End Justifies the Means(?)
|
Shuman, Bruce A. |
|
1997 |
|
1 |
p. 1-10 |
artikel |
126 |
The Four-Digit Date Problem
|
|
|
1999 |
|
1 |
p. 95-101 |
artikel |
127 |
Theft and Mutilation of Library Materials by Students in a University
|
Alao, I. A. |
|
2000 |
|
1 |
p. 63-78 |
artikel |
128 |
Theft and Mutilation of Library Materials in Nigerian Academic Libraries
|
Ajala, Isaac Olugbenga |
|
2008 |
|
1 |
p. 21-32 |
artikel |
129 |
Theft, Dissimulation and Trespass
|
Rude, Renee |
|
1994 |
|
1 |
p. 17-22 |
artikel |
130 |
The Neverending Saga of Library Theft
|
Goldberg, Martin |
|
1994 |
|
1 |
p. 87-100 |
artikel |
131 |
The Preservation Considerations in Electronic Security Systems
|
Harris, Carolyn |
|
1991 |
|
1 |
p. 35-42 |
artikel |
132 |
The Safeguarding of Memory
|
Owens, Brian M. |
|
2003 |
|
1 |
p. 9-41 |
artikel |
133 |
The Saying and the Doing: Part 2
|
Martin, Abigail Leab |
|
2000 |
|
1 |
p. 7-45 |
artikel |
134 |
The Struggle to Prevent Microorganisms from Devouring Library Resources in Nigeria
|
Ezennia, Steve E. |
|
1994 |
|
1 |
p. 23-33 |
artikel |
135 |
The Treatment of Other Libraries' Books by Nigerian University Libraries
|
Salaam, M. O. |
|
2006 |
|
1 |
p. 47-52 |
artikel |
136 |
Throwing the Book: The Recent Evolution of Federal Punishment for “Cultural Heritage” Crimes
|
McDade, Travis |
|
2008 |
|
1 |
p. 3-12 |
artikel |
137 |
Towering Inferno II- Recovering from an Electrical Fire in a Multi-Story Library
|
Hubbard, William J. |
|
1995 |
|
1 |
p. 61-75 |
artikel |
138 |
Upping the Ante on Overdues
|
Peterson, Nancy |
|
1980 |
|
1 |
p. 25-27 |
artikel |
139 |
Using Galileo's Catpac and ThoughtView Software to Analyze Texts
|
|
|
2006 |
|
1 |
p. 63-67 |
artikel |
140 |
VANDALISM IN LIBRARIES:
|
Sager, Donald |
|
1975 |
|
1 |
p. 5 |
artikel |
141 |
Vexing Viruses, Harmless Hoaxes
|
|
|
2001 |
|
1 |
p. 79-85 |
artikel |
142 |
Warfare and the Library
|
Sable, Martin H. |
|
1985 |
|
1 |
p. 25-97 |
artikel |
143 |
“You Found What in a Book?” Contraband Control in the Prison Library
|
Bouchard, Joseph |
|
2000 |
|
1 |
p. 47-61 |
artikel |