Protecting library staff, users, collections and facilities

Protecting library staff, users, collections and facilities

Reviews / Libr. Coll. Acq. & Tech. Serv. 26 (2002) 75–95 91 of OCLC’s Bibliographic Formats and Standards (1996). Students without access to OCLC ma...

10KB Sizes 2 Downloads 78 Views

Reviews / Libr. Coll. Acq. & Tech. Serv. 26 (2002) 75–95

91

of OCLC’s Bibliographic Formats and Standards (1996). Students without access to OCLC may require some “translation” from MARC 21, the current standard. They will also need to be operating in the PC environment to use the Illustrations of Examples CD-ROM, which accompanies the first five chapters. The graphic material may also be used for computer projections or for making transparency masters. An expanded version of the graphics is also available from the author via ftp or on disk (at cost). Part 1, “Cataloging,” (162 pp.) comprises the first five chapters, which examine rules for description, choice of access points, headings and references of various types and uniform titles. These follow AACR2 rather closely, noting occasionally a rule option or interpretation applied in LC cataloging if it does not contradict AACR2. Examples show MARC and some card formatting, and give explanations related to the point(s) being made. Part 2, “Subject Analysis,” (75 pp.) introduces techniques used in the two major general classification schemes—DDC21 and LCC—and their respective applications in full call numbers. Exercises are grouped as to the task that applies, such as use of the relative index or a table, number building, and some practice in Dewey number analysis. LCC exercises focus on LC-style hierarchies, adding “A–Z,” successively and author Cutter numbers, and practice in classifying with the H and P schedules. The same approach is followed in discussing the basics of applying LCSH to bibliographic records, where MARC-formatted authority records are also introduced. As with the descriptive exercises, the answer key provides comprehensive and detailed explanations of the process. It is time-consuming for individual instructors to accumulate thorough collections of examples to illustrate the intricacies of even basic cataloging standards, so this work constitutes a major boon to teaching. As with the texts in the field, anyone attempting to teach the subjects of cataloging and classification should have the most recent editions of each at hand. This one is a particularly excellent resource, and the CD-ROM provides graphic support both for instruction and exercises, which are of special value in the early stages of learning. While one might question giving students the answers to the exercises, there is no doubt that students themselves appreciate this, while instructors can find or create sufficient additional examples to use in graded work and quizzes. Joanna F. Fountain Graduate School of Library and Information Science University of Texas at Austin SZB 564 Austin, TX 78712 E-mail address: [email protected] PII: S1464-9055(01)00235-4

Protecting Library Staff, Users, Collections and Facilities By Pamela J. Cravey; How-to-Do-It Manuals for Librarians, 103. New York: NealSchuman Publishers, 2001, 175 pp, $55.00, soft, ISBN 1555703925

92

Reviews / Libr. Coll. Acq. & Tech. Serv. 26 (2002) 75–95

In Protecting Library Staff, Users, Collections, and Facilities, Pamela Cravey examines security issues in all type sand sizes of libraries. She provides an overview of library security and addresses security concerns of the library’s general collection, of library users and staff members, of electronic files and systems, of special collections and for special events. Within the chapters on collections security, Cravey discusses environmental issues, natural disasters and mutilation and theft by patrons and staff. The final chapter explores legal, personnel and vendor security considerations. Most chapters identify problem areas and suggest a range of solutions. In “Security of Electronic Files and Systems,” Cravey discusses confidentiality, integrity, and availability to legitimate users, along with related ethical and legal issues. Useful features include a training checklist, a sample incident report form, advice in developing a security audit, conducting an environmental scan, and a risk analysis. The author recommends developing an overall security plan specific to the library and a written policy and procedures. She stresses throughout the need to balance access to materials with their protection. Each chapter concludes with a bibliography of resources references in text. These can serve as recommended reading lists for each of the broad topics addressed in the book. The section on security consultants and commercial security systems is very brief. These topics are addressed in more depth in several articles in the journal, Library & Archival Security. Protecting Library Staff, Users, Collections, and Facilities is a fine introduction to the topic and full of practical helpful advice. However, Bruce Shuman’s Library Security and Safety Handbook: Prevention, Policies, and Procedures (Chicago: American Library Association, 1999) is a more thorough treatment of security and safety in libraries and at $42.00 for 310 pages, may be a better bargain.

Peggy Johnson University of Minnesota Libraries 499 Wilson Library 309 19th Avenue South Minneapolis, MN 55455 E-mail address: [email protected] PII: S1464-9055(01)00233-0

A Reader in Preservation and Conservation Comp and ed. by Ralph W. Manning and Virginie Kemp; Under the auspices of the IFLA Section on Preservation and Conservation, IFLA Publications, 91, Munich: K.G. Sauer, 2000, 157 pp, DM98.00 (DM73.50 IFLA members), hard, ISBN 3598218176 While there are few recent books in this subject area, this is the second IFLA work on preservation and conservation published within 12 months. The other reported on the recent IFLA Section on Preservation and Conservation Conference. Like most readers, the volume