1. Al‐Daoud, E., Jebril, I.H. and Zaqaibeh, B. (2008), “Computer virus strategies and detection methods”,International Journal of Open Problems in Computer Science and Mathematics (IJOPCM), Vol. 1 No. 2, pp. 29‐36.
2. Mustafa, F. and Khan, I. (2008), “Automation of Jamia Hamdard (Hamdard University): a case study of HMS Central Library”,ILA Bulletin, Vol. 44 Nos 3/4, pp. 24‐7.
3. Wang, J. and Liu, X. (2011), “Computer network security of university and preventive strategy”,Proceedings of IEEE 3rd International Conference on Communication Software and Networks (ICCSN), Xi'an, May, pp. 143‐5.
4. Zhen, Y. (2010), “Security of library information system under the network environment”,Proceedings of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010), Chengdu, China, Vol. 4, pp. 127‐9.