Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             127 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ABSTRACTS ON LIBRARY SECURITY Submission, Haworth Continuing Features
1975
2 p. 12-14
artikel
2 A CASE STUDY IN LIBRARY-POLICE RELATIONS Roth, Harold
1975
2 p. 2-3
artikel
3 A Changing of the Guard: Emerging Trends in Public Library Security Trapskin, Ben
2008
2 p. 69-76
artikel
4 A Concise Admonition on Securing Our Holdings Hauptman, Robert
1998
2 p. 5-6
artikel
5 Admission by Invitation Brown-Syed, Christopher
2000
2 p. 77-83
artikel
6 “America's Least Wanted” -Criminal Behavior and Library Loss Shuman, Bruce A.
1996
2 p. 1-8
artikel
7 Antisocial Acts in Libraries Ezennia, Steve E.
1996
2 p. 19-31
artikel
8 Archival and Library Theft Van Nort, Sydney C.
1994
2 p. 25-49
artikel
9 Are Our Libraries Safe from Losses? Ungarelli, Donald L.
1991
2 p. 117-122
artikel
10 Are You Truly Prepared? Cote, William C.
1989
2 p. 67-69
artikel
11 BAMBAM Update Leab, Katherine Kyes
1986
2 p. 59-130
artikel
12 BOOK REVIEW 2007
2 p. 67-68
artikel
13 BOOK REVIEW Bruer, J. Michael
1981
2 p. 45
artikel
14 BOOK REVIEWS 1998
2 p. 83-86
artikel
15 BOOK REVIEWS 2004
2 p. 63-65
artikel
16 BOOK REVIEWS 2000
2 p. 89-91
artikel
17 BOOK REVIEWS 2000
2 p. 71-74
artikel
18 Canadian Emergency Preparedness Initiatives Guerin, Lyn
2004
2 p. 3-5
artikel
19 Characteristics of Library Books Which Students Hide Alao, I. A.
2000
2 p. 63-68
artikel
20 Chlorine Dioxide Dry Fumigation in Special Collection Libraries Southwell, Kristina L.
2004
2 p. 39-49
artikel
21 Computer Cracking and Its Remedies 2000
2 p. 85-87
artikel
22 Computer Viruses Weems, Robyn P.
1998
2 p. 51-59
artikel
23 Copyright Issues Shuman, Bruce A.
1991
2 p. 103-115
artikel
24 Cornell University Libraries' Security Checklist Currie, Susan
1986
2 p. 3-13
artikel
25 Delinquent Readers in University Libraries in Ghana Alemna, Anaba
1996
2 p. 9-18
artikel
26 DEVELOPING A LIBRARY INSURANCE PROGRAM: Keneweg, Richard
1978
2 p. 12-14
artikel
27 Developing a Safety Training Program Wilkinson, Frances C.
2008
2 p. 77-85
artikel
28 EDITORIAL Brown-Syed, Christopher
2001
2 p. 3-5
artikel
29 EDITORIAL Shuman, Bruce A.
1994
2 p. 1-10
artikel
30 Editors' Introduction Lincoln, Alan Jay
1991
2 p. 1-2
artikel
31 EDITOR'S INTRODUCTION Brown-Syed, Christopher
2007
2 p. 1-2
artikel
32 EDITOR's INTRODUCTION 2000
2 p. 1-3
artikel
33 EDITOR'S INTRODUCTION Brown-Syed, Christopher
2001
2 p. 1-2
artikel
34 Editors' Introduction Lincoln, Alan Jay
1989
2 p. 1-2
artikel
35 EDITOR'S INTRODUCTION Brown-Syed, Christopher
2000
2 p. 1-2
artikel
36 EDITOR'S INTRODUCTION Brown-Syed, Christopher
2004
2 p. 1-2
artikel
37 Electronic Theft Detection Systems: A Survey Conducted in 1976 Romeo, Louis J.
1981
2 p. 1-16
artikel
38 Enhancing Building Security: Design Considerations McGinty, John
2008
2 p. 115-127
artikel
39 FILM REVIEW Sloan, William
1978
2 p. 17
artikel
40 FIRE HAZARDS IN LIBRARIES Harvey, Bruce
1975
2 p. 4-5
artikel
41 Fire Suppression and Water Mist Systems Myree, Simone
2008
2 p. 169-176
artikel
42 Frequently Asked Questions (FAQs) About Electronic Security Systems Stack, Michael J.
1998
2 p. 39-41
artikel
43 From The Editor's Desk Submission, Haworth Editorial
1978
2 p. 9-11
artikel
44 Function over Form: Security at the Bruce T. Halle Library Cheng, Rachel
2008
2 p. 151-158
artikel
45 Halting Untimely Book Ends Raloff, Janet
1986
2 p. 21-26
artikel
46 ImaginOn: Security Issues in a Joint-Use Children's Library/Children's Theater Facility Kilkka, Lois
2008
2 p. 87-113
artikel
47 Insurance and Library Facilities Payton, Annie Malessia
2008
2 p. 187-193
artikel
48 Insuring Libraries Against Risk McGinty, John
2008
2 p. 177-186
artikel
49 Integrated Library Security Systems Westenkirchner, Suzy
2008
2 p. 159-167
artikel
50 Inventory Wall, Carol
1986
2 p. 27-31
artikel
51 Jail Library Miller, Howard E.
1981
2 p. 41-43
artikel
52 Java Security Zhang, Xiangmin
2000
2 p. 5-20
artikel
53 Key Control Lincoln, Alan Jay
1989
2 p. 59-65
artikel
54 Large Loss Fires in the U.S. During 1989 Ungarelli, Donald L.
1993
2 p. 79-84
artikel
55 LAS Preservation Frusciano, Thomas J.
1986
2 p. 45-57
artikel
56 Late Night in an Academic Library Dimarco, Scott
1998
2 p. 7-23
artikel
57 LETTER TO THE EDITOR Submission, Haworth Continuing Features
1986
2 p. 1
artikel
58 Liability Insurance for Library Directors and Officers Stumpf, Warren W.
1986
2 p. 33-37
artikel
59 Library & Archival Security in the Next Century Brown-Syed, Christopher
1998
2 p. 1-4
artikel
60 Library Legislation Related to Crime and Security Lincoln, Alan Jay
1991
2 p. 77-101
artikel
61 Library Legislation Related to Crime and Security Lincoln, Alan Jay
1993
2 p. 37-48
artikel
62 Library Overdues Burgin, Robert
1991
2 p. 51-75
artikel
63 Library Safety and Security—Campus/Community Police Collaboration Lashley, Edwin L.
2008
2 p. 195-201
artikel
64 Library Security Latuszek, Thomas
2000
2 p. 3-7
artikel
65 Library Security, Book Theft and Mutilation Alemna, Anaba
1993
2 p. 23-35
artikel
66 Library Security by Design Carey, Jeanne
2008
2 p. 129-140
artikel
67 Library Security Checklist Submission, Haworth Continuing Features
1975
2 p. 10
artikel
68 Library Security Information and the Educational Resources Information Center (ERIC) Bahr, Alice Harrison
1991
2 p. 123-129
artikel
69 Library Theft Detection Systems-Future Trends and Present Strategies Stack, Michael J.
1998
2 p. 25-37
artikel
70 Managing After a Disaster, or There and Back Again Milles, James G.
2007
2 p. 35-52
artikel
71 Managing Microcomputer Security Riley, Gordon
1993
2 p. 1-22
artikel
72 Map Thefts, Library Security, Collecting, and Me: A Review of Harvey's The Island of Lost Maps Cox, Richard J.
2001
2 p. 45-58
artikel
73 Mitigating Computer Intrusion in an Open Computing Environment Hubbard, Daren
2000
2 p. 49-61
artikel
74 MUTILATIS MUTILANDIS Thompson, Lawrence
1978
2 p. 15-16
artikel
75 National Statistics - Fire Losses for 1987 Ungarelli, Donald L.
1989
2 p. 49-53
artikel
76 Network Security Online 1998
2 p. 75-81
artikel
77 New Products Submission, Haworth Continuing Features
1975
2 p. 15
artikel
78 New Products Submission, Haworth Continuing Features
1978
2 p. 18-23
artikel
79 Notes from the Field Submission, Haworth Continuing Features
1991
2 p. 131-135
artikel
80 Not in Our Stars Owens, Brian M.
1998
2 p. 61-66
artikel
81 No Unix/Linux Port of Entry Brown-Syed, Christopher
2004
2 p. 59-62
artikel
82 Premises Liability for Librarians Tryon, Jonathan S.
1991
2 p. 3-21
artikel
83 Preventing Public Sex in Library Settings Delph, Edward W.
1981
2 p. 17-26
artikel
84 Preventing Theft of Compact Discs at the Wyoming Branch Library Dennis, Brad
2000
2 p. 41-47
artikel
85 Proactive Problem Patron Preparedness Owens, Sheryl
1994
2 p. 11-23
artikel
86 Problem Patrons in Libraries - A Review Article Shuman, Bruce A.
1989
2 p. 3-19
artikel
87 Problems of Preservation of Library Materials Ezennia, Steve E.
1994
2 p. 51-62
artikel
88 PRODUCT REVIEW 2007
2 p. 69-72
artikel
89 Putting the Cart Before the Horse: Understanding the Pros and Cons of Digital Preservation Neri, Martha
2001
2 p. 59-64
artikel
90 Radio-Frequency-Identification for Security and Media Circulation in Libraries Erwin, Emmett
2004
2 p. 23-38
artikel
91 Radio Frequency Identification Systems for Libraries and Archives Ward, Diane
2004
2 p. 7-21
artikel
92 Readers' Questions Submission, Haworth Continuing Features
1989
2 p. 77-85
artikel
93 REVIEWS Thompson, Enid T.
1986
2 p. 39-44
artikel
94 Reviews Finley, Judith R.
1989
2 p. 71-75
artikel
95 Robots, Radio, and Patron Self-Service Brown-Syed, Christopher
2001
2 p. 65-68
artikel
96 ROUNDUP 2000
2 p. 69-70
artikel
97 SAFETY HAZARDS IN LIBRARIES: Lynskey, Thomas A.
1978
2 p. 7-8
artikel
98 Saving Paper Treasures Zipkowitz, Fay
1986
2 p. 15-20
artikel
99 School Library Security Submission, Haworth Continuing Features
1975
2 p. 11
artikel
100 Security of Microsoft Access Databases Yerkey, A. Neil
2001
2 p. 29-43
artikel
101 Security Technology Bahr, Alice Harrison
1989
2 p. 55-58
artikel
102 Selecting Historical Records for Microfilming Cox, Richard J.
1989
2 p. 21-41
artikel
103 Self-Checkout Systems Leslie, Donald S.
1994
2 p. 63-71
artikel
104 Special Issue: New Library Security for Buildings, Users, and Staff Bahr, Alice H.
2008
2 p. 57-58
artikel
105 Stachybotrys-Media Hype or True Hazard? Sexton, Ellen
2001
2 p. 7-27
artikel
106 State Statutes on Confidentiality of Information Lincoln, Alan Jay
1993
2 p. 49-77
artikel
107 State Statutes on Confidentiality of Library Circulation Records Seaman, Scott
1996
2 p. 33-70
artikel
108 STRENGTHEN YOUR SECURITY POSTURE O'Neil, James W.
1975
2 p. 7-9
artikel
109 Student Patrollers Morrissett, Linda A.
1994
2 p. 73-81
artikel
110 The Correct Mindset Reed, Charles
2008
2 p. 59-67
artikel
111 The Disaster Control Plan Matthews, Graham
2007
2 p. 3-23
artikel
112 Theft and Mutilation of Library Materials Susanna, Ann Curry
2000
2 p. 9-26
artikel
113 Theft at the National Archives Jackanicz, Donald W.
1991
2 p. 23-50
artikel
114 The Goucher Athenaeum: Showcasing and Securing Special Collections Magnuson, Nancy
2008
2 p. 141-150
artikel
115 The Harmattan and Library Resources Management in Nigeria Ezennia, S. E.
1989
2 p. 43-48
artikel
116 The Journey Out and In Brown-Syed, Christopher
2000
2 p. 21-40
artikel
117 The Need for Information Ethics Holverstott-Cockrell, Michael
1998
2 p. 67-73
artikel
118 The Permanent Collection Thompson, Enid Thornton
1981
2 p. 31-39
artikel
119 The Saying and the Doing Martin, Abigail Leab
2000
2 p. 27-75
artikel
120 THE USE OF SECURITY GUARDS IN LIBRARIES Schlinder, Pat
1978
2 p. 1-6
artikel
121 The WNYLRC Disaster Manual Battleson, Brenda
2007
2 p. 25-28
artikel
122 The WNYLRC Disaster Plan 2007
2 p. 29-33
artikel
123 U.S. Department of Defense Sets Information Assurance Standards Brown-Syed, Christopher
2007
2 p. 53-61
artikel
124 VIDEO REVIEW 2007
2 p. 63-66
artikel
125 Waging the War Against Crimes in Florida's Public Libraries Scott, Betty Ann
1981
2 p. 27-30
artikel
126 What's Next for the Radio Frequency Library Scire, Toni
2004
2 p. 51-58
artikel
127 Zero Tolerance at the Library Braaksma, Betty
1998
2 p. 43-49
artikel
                             127 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland