Please use this identifier to cite or link to this item:
http://ir.inflibnet.ac.in/handle/1944/207
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Joseph, J V M | en_US |
dc.contributor.author | Soundararajan, E | en_US |
dc.contributor.author | Jayakumar, C | en_US |
dc.contributor.author | Venkadesan, S | en_US |
dc.date.accessioned | 2004-07-30T12:58:10Z | en_US |
dc.date.accessioned | 2010-04-08T08:36:26Z | - |
dc.date.available | 2004-07-30T12:58:10Z | en_US |
dc.date.available | 2010-04-08T08:36:26Z | - |
dc.date.issued | 2003-02 | en_US |
dc.identifier.uri | http://hdl.handle.net/1944/207 | en_US |
dc.description.abstract | The contribution of networking technologies for a library is significant. The need for proper administration and security for the library LAN is important as considered against the contents. This paper discusses about the methods and issues of network administration in a library followed by the security methods to be adapted on various levels in order to protect the contents from hackers/unauthorized access. The usage of data compression methods, network traffic management algorithms, encryption methods, metadata standards, and backup and recovery procedures are highlighted. | en_US |
dc.format.extent | 16349 bytes | en_US |
dc.format.mimetype | application/pdf | en_US |
dc.language.iso | en | en_US |
dc.publisher | INFLIBNET Centre | en_US |
dc.subject | Network security | en_US |
dc.subject | Firewall | en_US |
dc.subject | Quality of Service | en_US |
dc.subject | Metadata | en_US |
dc.subject | Network Traffic | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Content Security | en_US |
dc.subject | Data Compression | en_US |
dc.subject | ATM | en_US |
dc.subject | Digital content preservation | en_US |
dc.title | Network Administration and Security in a Digital Library Environment | en_US |
dc.type | Article | en_US |
Appears in Collections: | CALIBER 2003:Ahmedabad |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
03cali_38.pdf | 41.08 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.