nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ABSTRACTS ON LIBRARY SECURITY
|
Submission, Haworth Continuing Features |
|
1975 |
|
2 |
p. 12-14 |
artikel |
2 |
A CASE STUDY IN LIBRARY-POLICE RELATIONS
|
Roth, Harold |
|
1975 |
|
2 |
p. 2-3 |
artikel |
3 |
A Changing of the Guard: Emerging Trends in Public Library Security
|
Trapskin, Ben |
|
2008 |
|
2 |
p. 69-76 |
artikel |
4 |
A Concise Admonition on Securing Our Holdings
|
Hauptman, Robert |
|
1998 |
|
2 |
p. 5-6 |
artikel |
5 |
Admission by Invitation
|
Brown-Syed, Christopher |
|
2000 |
|
2 |
p. 77-83 |
artikel |
6 |
“America's Least Wanted” -Criminal Behavior and Library Loss
|
Shuman, Bruce A. |
|
1996 |
|
2 |
p. 1-8 |
artikel |
7 |
Antisocial Acts in Libraries
|
Ezennia, Steve E. |
|
1996 |
|
2 |
p. 19-31 |
artikel |
8 |
Archival and Library Theft
|
Van Nort, Sydney C. |
|
1994 |
|
2 |
p. 25-49 |
artikel |
9 |
Are Our Libraries Safe from Losses?
|
Ungarelli, Donald L. |
|
1991 |
|
2 |
p. 117-122 |
artikel |
10 |
Are You Truly Prepared?
|
Cote, William C. |
|
1989 |
|
2 |
p. 67-69 |
artikel |
11 |
BAMBAM Update
|
Leab, Katherine Kyes |
|
1986 |
|
2 |
p. 59-130 |
artikel |
12 |
BOOK REVIEW
|
|
|
2007 |
|
2 |
p. 67-68 |
artikel |
13 |
BOOK REVIEW
|
Bruer, J. Michael |
|
1981 |
|
2 |
p. 45 |
artikel |
14 |
BOOK REVIEWS
|
|
|
1998 |
|
2 |
p. 83-86 |
artikel |
15 |
BOOK REVIEWS
|
|
|
2004 |
|
2 |
p. 63-65 |
artikel |
16 |
BOOK REVIEWS
|
|
|
2000 |
|
2 |
p. 89-91 |
artikel |
17 |
BOOK REVIEWS
|
|
|
2000 |
|
2 |
p. 71-74 |
artikel |
18 |
Canadian Emergency Preparedness Initiatives
|
Guerin, Lyn |
|
2004 |
|
2 |
p. 3-5 |
artikel |
19 |
Characteristics of Library Books Which Students Hide
|
Alao, I. A. |
|
2000 |
|
2 |
p. 63-68 |
artikel |
20 |
Chlorine Dioxide Dry Fumigation in Special Collection Libraries
|
Southwell, Kristina L. |
|
2004 |
|
2 |
p. 39-49 |
artikel |
21 |
Computer Cracking and Its Remedies
|
|
|
2000 |
|
2 |
p. 85-87 |
artikel |
22 |
Computer Viruses
|
Weems, Robyn P. |
|
1998 |
|
2 |
p. 51-59 |
artikel |
23 |
Copyright Issues
|
Shuman, Bruce A. |
|
1991 |
|
2 |
p. 103-115 |
artikel |
24 |
Cornell University Libraries' Security Checklist
|
Currie, Susan |
|
1986 |
|
2 |
p. 3-13 |
artikel |
25 |
Delinquent Readers in University Libraries in Ghana
|
Alemna, Anaba |
|
1996 |
|
2 |
p. 9-18 |
artikel |
26 |
DEVELOPING A LIBRARY INSURANCE PROGRAM:
|
Keneweg, Richard |
|
1978 |
|
2 |
p. 12-14 |
artikel |
27 |
Developing a Safety Training Program
|
Wilkinson, Frances C. |
|
2008 |
|
2 |
p. 77-85 |
artikel |
28 |
EDITORIAL
|
Brown-Syed, Christopher |
|
2001 |
|
2 |
p. 3-5 |
artikel |
29 |
EDITORIAL
|
Shuman, Bruce A. |
|
1994 |
|
2 |
p. 1-10 |
artikel |
30 |
Editors' Introduction
|
Lincoln, Alan Jay |
|
1991 |
|
2 |
p. 1-2 |
artikel |
31 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2007 |
|
2 |
p. 1-2 |
artikel |
32 |
EDITOR's INTRODUCTION
|
|
|
2000 |
|
2 |
p. 1-3 |
artikel |
33 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2001 |
|
2 |
p. 1-2 |
artikel |
34 |
Editors' Introduction
|
Lincoln, Alan Jay |
|
1989 |
|
2 |
p. 1-2 |
artikel |
35 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2000 |
|
2 |
p. 1-2 |
artikel |
36 |
EDITOR'S INTRODUCTION
|
Brown-Syed, Christopher |
|
2004 |
|
2 |
p. 1-2 |
artikel |
37 |
Electronic Theft Detection Systems: A Survey Conducted in 1976
|
Romeo, Louis J. |
|
1981 |
|
2 |
p. 1-16 |
artikel |
38 |
Enhancing Building Security: Design Considerations
|
McGinty, John |
|
2008 |
|
2 |
p. 115-127 |
artikel |
39 |
FILM REVIEW
|
Sloan, William |
|
1978 |
|
2 |
p. 17 |
artikel |
40 |
FIRE HAZARDS IN LIBRARIES
|
Harvey, Bruce |
|
1975 |
|
2 |
p. 4-5 |
artikel |
41 |
Fire Suppression and Water Mist Systems
|
Myree, Simone |
|
2008 |
|
2 |
p. 169-176 |
artikel |
42 |
Frequently Asked Questions (FAQs) About Electronic Security Systems
|
Stack, Michael J. |
|
1998 |
|
2 |
p. 39-41 |
artikel |
43 |
From The Editor's Desk
|
Submission, Haworth Editorial |
|
1978 |
|
2 |
p. 9-11 |
artikel |
44 |
Function over Form: Security at the Bruce T. Halle Library
|
Cheng, Rachel |
|
2008 |
|
2 |
p. 151-158 |
artikel |
45 |
Halting Untimely Book Ends
|
Raloff, Janet |
|
1986 |
|
2 |
p. 21-26 |
artikel |
46 |
ImaginOn: Security Issues in a Joint-Use Children's Library/Children's Theater Facility
|
Kilkka, Lois |
|
2008 |
|
2 |
p. 87-113 |
artikel |
47 |
Insurance and Library Facilities
|
Payton, Annie Malessia |
|
2008 |
|
2 |
p. 187-193 |
artikel |
48 |
Insuring Libraries Against Risk
|
McGinty, John |
|
2008 |
|
2 |
p. 177-186 |
artikel |
49 |
Integrated Library Security Systems
|
Westenkirchner, Suzy |
|
2008 |
|
2 |
p. 159-167 |
artikel |
50 |
Inventory
|
Wall, Carol |
|
1986 |
|
2 |
p. 27-31 |
artikel |
51 |
Jail Library
|
Miller, Howard E. |
|
1981 |
|
2 |
p. 41-43 |
artikel |
52 |
Java Security
|
Zhang, Xiangmin |
|
2000 |
|
2 |
p. 5-20 |
artikel |
53 |
Key Control
|
Lincoln, Alan Jay |
|
1989 |
|
2 |
p. 59-65 |
artikel |
54 |
Large Loss Fires in the U.S. During 1989
|
Ungarelli, Donald L. |
|
1993 |
|
2 |
p. 79-84 |
artikel |
55 |
LAS Preservation
|
Frusciano, Thomas J. |
|
1986 |
|
2 |
p. 45-57 |
artikel |
56 |
Late Night in an Academic Library
|
Dimarco, Scott |
|
1998 |
|
2 |
p. 7-23 |
artikel |
57 |
LETTER TO THE EDITOR
|
Submission, Haworth Continuing Features |
|
1986 |
|
2 |
p. 1 |
artikel |
58 |
Liability Insurance for Library Directors and Officers
|
Stumpf, Warren W. |
|
1986 |
|
2 |
p. 33-37 |
artikel |
59 |
Library & Archival Security in the Next Century
|
Brown-Syed, Christopher |
|
1998 |
|
2 |
p. 1-4 |
artikel |
60 |
Library Legislation Related to Crime and Security
|
Lincoln, Alan Jay |
|
1991 |
|
2 |
p. 77-101 |
artikel |
61 |
Library Legislation Related to Crime and Security
|
Lincoln, Alan Jay |
|
1993 |
|
2 |
p. 37-48 |
artikel |
62 |
Library Overdues
|
Burgin, Robert |
|
1991 |
|
2 |
p. 51-75 |
artikel |
63 |
Library Safety and Security—Campus/Community Police Collaboration
|
Lashley, Edwin L. |
|
2008 |
|
2 |
p. 195-201 |
artikel |
64 |
Library Security
|
Latuszek, Thomas |
|
2000 |
|
2 |
p. 3-7 |
artikel |
65 |
Library Security, Book Theft and Mutilation
|
Alemna, Anaba |
|
1993 |
|
2 |
p. 23-35 |
artikel |
66 |
Library Security by Design
|
Carey, Jeanne |
|
2008 |
|
2 |
p. 129-140 |
artikel |
67 |
Library Security Checklist
|
Submission, Haworth Continuing Features |
|
1975 |
|
2 |
p. 10 |
artikel |
68 |
Library Security Information and the Educational Resources Information Center (ERIC)
|
Bahr, Alice Harrison |
|
1991 |
|
2 |
p. 123-129 |
artikel |
69 |
Library Theft Detection Systems-Future Trends and Present Strategies
|
Stack, Michael J. |
|
1998 |
|
2 |
p. 25-37 |
artikel |
70 |
Managing After a Disaster, or There and Back Again
|
Milles, James G. |
|
2007 |
|
2 |
p. 35-52 |
artikel |
71 |
Managing Microcomputer Security
|
Riley, Gordon |
|
1993 |
|
2 |
p. 1-22 |
artikel |
72 |
Map Thefts, Library Security, Collecting, and Me: A Review of Harvey's The Island of Lost Maps
|
Cox, Richard J. |
|
2001 |
|
2 |
p. 45-58 |
artikel |
73 |
Mitigating Computer Intrusion in an Open Computing Environment
|
Hubbard, Daren |
|
2000 |
|
2 |
p. 49-61 |
artikel |
74 |
MUTILATIS MUTILANDIS
|
Thompson, Lawrence |
|
1978 |
|
2 |
p. 15-16 |
artikel |
75 |
National Statistics - Fire Losses for 1987
|
Ungarelli, Donald L. |
|
1989 |
|
2 |
p. 49-53 |
artikel |
76 |
Network Security Online
|
|
|
1998 |
|
2 |
p. 75-81 |
artikel |
77 |
New Products
|
Submission, Haworth Continuing Features |
|
1975 |
|
2 |
p. 15 |
artikel |
78 |
New Products
|
Submission, Haworth Continuing Features |
|
1978 |
|
2 |
p. 18-23 |
artikel |
79 |
Notes from the Field
|
Submission, Haworth Continuing Features |
|
1991 |
|
2 |
p. 131-135 |
artikel |
80 |
Not in Our Stars
|
Owens, Brian M. |
|
1998 |
|
2 |
p. 61-66 |
artikel |
81 |
No Unix/Linux Port of Entry
|
Brown-Syed, Christopher |
|
2004 |
|
2 |
p. 59-62 |
artikel |
82 |
Premises Liability for Librarians
|
Tryon, Jonathan S. |
|
1991 |
|
2 |
p. 3-21 |
artikel |
83 |
Preventing Public Sex in Library Settings
|
Delph, Edward W. |
|
1981 |
|
2 |
p. 17-26 |
artikel |
84 |
Preventing Theft of Compact Discs at the Wyoming Branch Library
|
Dennis, Brad |
|
2000 |
|
2 |
p. 41-47 |
artikel |
85 |
Proactive Problem Patron Preparedness
|
Owens, Sheryl |
|
1994 |
|
2 |
p. 11-23 |
artikel |
86 |
Problem Patrons in Libraries - A Review Article
|
Shuman, Bruce A. |
|
1989 |
|
2 |
p. 3-19 |
artikel |
87 |
Problems of Preservation of Library Materials
|
Ezennia, Steve E. |
|
1994 |
|
2 |
p. 51-62 |
artikel |
88 |
PRODUCT REVIEW
|
|
|
2007 |
|
2 |
p. 69-72 |
artikel |
89 |
Putting the Cart Before the Horse: Understanding the Pros and Cons of Digital Preservation
|
Neri, Martha |
|
2001 |
|
2 |
p. 59-64 |
artikel |
90 |
Radio-Frequency-Identification for Security and Media Circulation in Libraries
|
Erwin, Emmett |
|
2004 |
|
2 |
p. 23-38 |
artikel |
91 |
Radio Frequency Identification Systems for Libraries and Archives
|
Ward, Diane |
|
2004 |
|
2 |
p. 7-21 |
artikel |
92 |
Readers' Questions
|
Submission, Haworth Continuing Features |
|
1989 |
|
2 |
p. 77-85 |
artikel |
93 |
REVIEWS
|
Thompson, Enid T. |
|
1986 |
|
2 |
p. 39-44 |
artikel |
94 |
Reviews
|
Finley, Judith R. |
|
1989 |
|
2 |
p. 71-75 |
artikel |
95 |
Robots, Radio, and Patron Self-Service
|
Brown-Syed, Christopher |
|
2001 |
|
2 |
p. 65-68 |
artikel |
96 |
ROUNDUP
|
|
|
2000 |
|
2 |
p. 69-70 |
artikel |
97 |
SAFETY HAZARDS IN LIBRARIES:
|
Lynskey, Thomas A. |
|
1978 |
|
2 |
p. 7-8 |
artikel |
98 |
Saving Paper Treasures
|
Zipkowitz, Fay |
|
1986 |
|
2 |
p. 15-20 |
artikel |
99 |
School Library Security
|
Submission, Haworth Continuing Features |
|
1975 |
|
2 |
p. 11 |
artikel |
100 |
Security of Microsoft Access Databases
|
Yerkey, A. Neil |
|
2001 |
|
2 |
p. 29-43 |
artikel |
101 |
Security Technology
|
Bahr, Alice Harrison |
|
1989 |
|
2 |
p. 55-58 |
artikel |
102 |
Selecting Historical Records for Microfilming
|
Cox, Richard J. |
|
1989 |
|
2 |
p. 21-41 |
artikel |
103 |
Self-Checkout Systems
|
Leslie, Donald S. |
|
1994 |
|
2 |
p. 63-71 |
artikel |
104 |
Special Issue: New Library Security for Buildings, Users, and Staff
|
Bahr, Alice H. |
|
2008 |
|
2 |
p. 57-58 |
artikel |
105 |
Stachybotrys-Media Hype or True Hazard?
|
Sexton, Ellen |
|
2001 |
|
2 |
p. 7-27 |
artikel |
106 |
State Statutes on Confidentiality of Information
|
Lincoln, Alan Jay |
|
1993 |
|
2 |
p. 49-77 |
artikel |
107 |
State Statutes on Confidentiality of Library Circulation Records
|
Seaman, Scott |
|
1996 |
|
2 |
p. 33-70 |
artikel |
108 |
STRENGTHEN YOUR SECURITY POSTURE
|
O'Neil, James W. |
|
1975 |
|
2 |
p. 7-9 |
artikel |
109 |
Student Patrollers
|
Morrissett, Linda A. |
|
1994 |
|
2 |
p. 73-81 |
artikel |
110 |
The Correct Mindset
|
Reed, Charles |
|
2008 |
|
2 |
p. 59-67 |
artikel |
111 |
The Disaster Control Plan
|
Matthews, Graham |
|
2007 |
|
2 |
p. 3-23 |
artikel |
112 |
Theft and Mutilation of Library Materials
|
Susanna, Ann Curry |
|
2000 |
|
2 |
p. 9-26 |
artikel |
113 |
Theft at the National Archives
|
Jackanicz, Donald W. |
|
1991 |
|
2 |
p. 23-50 |
artikel |
114 |
The Goucher Athenaeum: Showcasing and Securing Special Collections
|
Magnuson, Nancy |
|
2008 |
|
2 |
p. 141-150 |
artikel |
115 |
The Harmattan and Library Resources Management in Nigeria
|
Ezennia, S. E. |
|
1989 |
|
2 |
p. 43-48 |
artikel |
116 |
The Journey Out and In
|
Brown-Syed, Christopher |
|
2000 |
|
2 |
p. 21-40 |
artikel |
117 |
The Need for Information Ethics
|
Holverstott-Cockrell, Michael |
|
1998 |
|
2 |
p. 67-73 |
artikel |
118 |
The Permanent Collection
|
Thompson, Enid Thornton |
|
1981 |
|
2 |
p. 31-39 |
artikel |
119 |
The Saying and the Doing
|
Martin, Abigail Leab |
|
2000 |
|
2 |
p. 27-75 |
artikel |
120 |
THE USE OF SECURITY GUARDS IN LIBRARIES
|
Schlinder, Pat |
|
1978 |
|
2 |
p. 1-6 |
artikel |
121 |
The WNYLRC Disaster Manual
|
Battleson, Brenda |
|
2007 |
|
2 |
p. 25-28 |
artikel |
122 |
The WNYLRC Disaster Plan
|
|
|
2007 |
|
2 |
p. 29-33 |
artikel |
123 |
U.S. Department of Defense Sets Information Assurance Standards
|
Brown-Syed, Christopher |
|
2007 |
|
2 |
p. 53-61 |
artikel |
124 |
VIDEO REVIEW
|
|
|
2007 |
|
2 |
p. 63-66 |
artikel |
125 |
Waging the War Against Crimes in Florida's Public Libraries
|
Scott, Betty Ann |
|
1981 |
|
2 |
p. 27-30 |
artikel |
126 |
What's Next for the Radio Frequency Library
|
Scire, Toni |
|
2004 |
|
2 |
p. 51-58 |
artikel |
127 |
Zero Tolerance at the Library
|
Braaksma, Betty |
|
1998 |
|
2 |
p. 43-49 |
artikel |