Please wait a minute...
New Technology of Library and Information Service  2003, Vol. 19 Issue (6): 40-41    DOI: 10.11925/infotech.1003-3513.2003.06.11
Current Issue | Archive | Adv Search |
The Computer s Security of Public Access in the Library of Univesity
Gong Linli
(Library of Northwest Normal University, Lanzhou 730070, China)  
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

With a brief analysis to some popular ways of the computer by public retrieve in academic library,the author introduces an effective way for this security.

Key wordsLibrary      Hard disk      Recover card     
Received: 14 January 2003      Published: 25 December 2003
ZTFLH: 

G258.94

 
Corresponding Authors: Gong Linli   
About author:: Gong Linli

Cite this article:

Gong Linli. The Computer s Security of Public Access in the Library of Univesity. New Technology of Library and Information Service, 2003, 19(6): 40-41.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2003.06.11     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2003/V19/I6/40


[1]李霞.几种常见的硬盘保护.现代计算机,1992,(2):2-3

[2]成 运.怎样选购硬盘还保护.电子计算机与外部设备,1997,(4):1

[3]袁宗福,卞旭芬.硬盘保护技术.电子计算机与外部设备,1999,(1):23-25

[1] Lu Linong,Zhu Zhongming,Zhang Wangqiang,Wang Xiaochun. Cross-database Knowledge Integration and Fingerprint of Institutional Repositories with Lingo3G Clustering Algorithm[J]. 数据分析与知识发现, 2021, 5(5): 127-132.
[2] Chen Shiji, Qiu Junping, Yu Bo. Topic Analysis of LIS Big Data Research with Overlay Mapping[J]. 数据分析与知识发现, 2021, 5(10): 51-59.
[3] Bi Datian,Wang Fu,Xu Pengcheng. Analyzing Mobile Library Users and Recommending Services with VSM[J]. 数据分析与知识发现, 2018, 2(9): 100-108.
[4] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[5] Zhang Xuanhui,Zhao Yuxiang. Evolution Path and Hot Topics of Citizen Science Studies[J]. 数据分析与知识发现, 2017, 1(7): 22-34.
[6] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[7] Wang Yuefen,Jin Jialin. Characteristics and Development Trends of Papers from “New Technology of Library and Information Service”[J]. 现代图书情报技术, 2016, 32(9): 1-16.
[8] Sun Rong. Building Library APP with Mobile Platform on Campus——Case Study of Whistle Platform[J]. 现代图书情报技术, 2016, 32(9): 95-101.
[9] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[10] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[11] Li Feng,Li Shu’ning,Yu Jing. A Department Oriented Library Usage Data System for Graduates[J]. 现代图书情报技术, 2016, 32(5): 99-103.
[12] Zhang Jinzhu,Wang Xiaomei,Han Tao. Predicting Co-authorship with Combination of Paths in Paper-author Bipartite Networks[J]. 现代图书情报技术, 2016, 32(10): 42-49.
[13] Dun Wenjie, Sun Yigang, Zhu Xianzhong. Design and Realization of Multimedia Document Structure of Internet TV[J]. 现代图书情报技术, 2015, 31(9): 82-89.
[14] Wang Xiaoliang, Hu Jun. Design and Implementation of Library Self-service Graduation Deactivate Account System[J]. 现代图书情报技术, 2015, 31(4): 96-102.
[15] Li Sheng, Wang Yemao. An Ontology-based and Location-aware Book Recommendation Model in Library[J]. 现代图书情报技术, 2015, 31(3): 58-66.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn