1. Balas, J. (2005), “Close the gates, lock the windows, bolt the doors: securing library computers”,Computers in Libraries, Vol. 25 No. 3, pp. 28‐30.
2. Breeding, M. (2005), “Building trust through secure web sites”,Computers in Libraries, Vol. 25 No. 6, pp. 24‐6.
3. Data protection: Where are we now?
4. Internet Security: A Novel Role/Object-Based Access Control for Digital Libraries
5. Cheng, K. (2005), “Surviving hacker attacks proves that every cloud has a silver lining”,Computers in Libraries, Vol. 25 No. 3, pp. 6‐8, 52‐6.