Protecting your library's digital sources the essential guide to planning and preservation
Saved in:
| Main Author: | Kahn, Miriam (Miriam B.) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Chicago
American Library Association
2004
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Emergency preparedness for libraries
by: Todaro, Julie Beth
Published: (2009)
by: Todaro, Julie Beth
Published: (2009)
Disaster planning a how-to-do-it manual for librarians with planning templates on CD-ROM
by: Halsted, Deborah D.
Published: (2005)
by: Halsted, Deborah D.
Published: (2005)
Making the most of RFID in libraries
by: Palmer, Martin
Published: (2009)
by: Palmer, Martin
Published: (2009)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Libraries designed for users a 21st century guide
by: Lushington, Nolan 1929-
Published: (2002)
by: Lushington, Nolan 1929-
Published: (2002)
The preservation management handbook a 21st-century guide for libraries, archives, and museums
Published: (2014)
Published: (2014)
Web caching and replication
by: RabinovichlhMichael
by: RabinovichlhMichael
Library builders
Published: (1997)
Published: (1997)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Information protection playbook
Published: (2013)
Published: (2013)
Windows forensics and incident recovery
by: Carvey, Harlan A.
Published: (2005)
by: Carvey, Harlan A.
Published: (2005)
Better by design an introduction to planning and designing a new library building
by: Ayub Khan
Published: (2009)
by: Ayub Khan
Published: (2009)
Managing your library construction project step-by-step guide
by: McCarthy, Richard C. (Richard Charles) 1955-
Published: (2007)
by: McCarthy, Richard C. (Richard Charles) 1955-
Published: (2007)
Health, safety and accident management in the chemical process industries
by: Flynn
by: Flynn
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Managing facilities for results optimizing space for services
by: Bryan, Cheryl
Published: (2007)
by: Bryan, Cheryl
Published: (2007)
Managing maritime safety
Published: (2018)
Published: (2018)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Digital rights management an introduction
Published: (2010)
Published: (2010)
SQL server 2000 backup & recovery
by: Desai
Published: (2001)
by: Desai
Published: (2001)
Critical infrastructure protection from cybersecurity to cyber resilience
Published: (2021)
Published: (2021)
Crisis management in construction projects
by: Loosemore lhMartin
by: Loosemore lhMartin
International Ship and Port Facility Security Code and SOLAS amendments adopted 12 December 2002
Published: (2003)
Published: (2003)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Anti-hacker tool kit
by: Shema, Mike
Published: (2014)
by: Shema, Mike
Published: (2014)
Protection against overcurrent
Data science for cyber-security
Published: (2019)
Published: (2019)
Computer security handbook
Published: (2014)
Published: (2014)
Protection against overcurrent
Published: (2003)
Published: (2003)
Electrical safety handbook
by: Cadick, John
Published: (1994)
by: Cadick, John
Published: (1994)
Pembangunan budaya keselamatan di tempat kerja
by: Mohd Saidin Misnan, et al.
Published: (2011)
by: Mohd Saidin Misnan, et al.
Published: (2011)
Construction safety management
by: Howarth, Tim
Published: (2009)
by: Howarth, Tim
Published: (2009)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
Parliamentary libraries and research services in central and Eastern Europe Building more effective legislatures
Published: (1998)
Published: (1998)
Similar Items
-
Emergency preparedness for libraries
by: Todaro, Julie Beth
Published: (2009) -
Disaster planning a how-to-do-it manual for librarians with planning templates on CD-ROM
by: Halsted, Deborah D.
Published: (2005) -
Making the most of RFID in libraries
by: Palmer, Martin
Published: (2009) -
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016) -
Libraries designed for users a 21st century guide
by: Lushington, Nolan 1929-
Published: (2002)


