

Author: Robbins Sarah Engel Debra Bierman James
Publisher: Emerald Group Publishing Ltd
ISSN: 0737-8831
Source: Library Hi Tech, Vol.24, Iss.2, 2006-04, pp. : 261-272
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Using Bluestem for Web user authentication and access control of library resources
Library Hi Tech, Vol. 15, Iss. 1-2, 1997-04 ,pp. :