- Full text PDF available (1)
- This year (0)
- Last 5 years (0)
- Last 10 years (1)
Computing systems continue to be plagued by malicious corruption of instructions and data. Buffer overflows, in particular, are often employed to disrupt the control flow of vulnerable processes. Existing methods of protection against these attacks operate by detecting corruption after it has taken place or by ensuring that if corruption has taken place, it… (More)
The Geisinger Medical Center Library implemented a GRATEFUL MED outreach project in rural north-central Pennsylvania directed at providing physicians access to current medical literature. A total of 1,327 physicians affiliated with twenty-three hospitals practice in a thirteen-county area the size of the state of New Jersey. Of these hospitals, only four… (More)
Libraries today, including most hospital-based patients' libraries, are involved only peripherally in providing patient health science information. Hospital libraries should collaborate with health professionals in getting health information to patients--along with the library's more traditional roles of providing recreational reading for patients and… (More)
The relocation of a medical center library collection of 30,000 book and journal volumes and 600 audiovisuals is described. The planning and moving procedures which facilitated the move are detailed. A bibliography of the library literature concerning library moves is attached.