Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (3): 56-59    DOI: 10.11925/infotech.1003-3513.2004.03.18
Current Issue | Archive | Adv Search |
The Security Techniques for Library Networks
Zhang Jiping   Xu Quanli   Mu Ming
(Library of Xidian University, Xi'an 710071,China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      

Many library networks have been connected to the Internet. This results in that information security problems must be considered for a library network. In this paper we will present the strategies of information protection and network security management for a library network. Some security techniques, such as firewall, inbreak detection, and webpage protection, are introduced with a brief discussion on their implementation techniques, and advantages and disadvantages.

Key wordsNetwork management      Information security      Inbreak detection      Webpage protection      Backup recovery     
Received: 21 May 2003      Published: 25 March 2004


Corresponding Authors: Zhang Jiping     E-mail:
About author:: Zhang Jiping,Xu Quanli,Mu Ming

Cite this article:

Zhang Jiping,Xu Quanli,Mu Ming. The Security Techniques for Library Networks. New Technology of Library and Information Service, 2004, 20(3): 56-59.

URL:     OR

1WebAlarm, May 18,2003)
2Best Web Site Protect solution--Webpage Protector, May 18,2003)
3J. A. Goguen , J. Meseguer, “Security policies and security models,” Oakland CA: IEEE computer society.
6如何保护您的网站? May 18,2003)

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[3] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[4] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[5] Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information[J]. 现代图书情报技术, 2007, 2(2): 75-77.
[6] Lu Juemin,Zheng Yu. A Study on Software Protection of Browser in Opening  Network Management of Library[J]. 现代图书情报技术, 2005, 21(2): 94-95.
[7] He Donghong,Guo Xinhua. The Design and Implementation of the Library Network Management System Based on JSP/Servlet and JavaBeans[J]. 现代图书情报技术, 2004, 20(9): 98-100.
[8] Niu Zhendong,Shi Xuelin,Ye Chenglin. Status and Trend of Research on Standards Involved in Digital Libraries[J]. 现代图书情报技术, 2004, 20(7): 1-5.
[9] Xiang Yu,Wang Jin. Study on Application of Symantec Ghost in Network Management[J]. 现代图书情报技术, 2004, 20(3): 87-89.
[10] Li Shuning,Ma Mingxia. The Applying of Digital Watermark in Digital Library Security[J]. 现代图书情报技术, 2002, 18(1): 17-19.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Du Shouxian. The Method to Research and Construct a Local Network in the Library of Shengli Oilfield[J]. 现代图书情报技术, 2001, 17(5): 79-81.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[14] Wu Jing. Network Accounting System Base on Flux of Communication in Library[J]. 现代图书情报技术, 2001, 17(1): 75-77.
[15] Guo Xiaomiao. Information Security Protection Technology for the Internet[J]. 现代图书情报技术, 2000, 16(3): 50-51.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938