Products & ServicesSee also: Categories | Featured Products | Parts by Number | Technical Articles | Engineering Web Results
Supplier: C&H Distributors, LLC
Description: EDSAL Computer Security Cabinet protects valuable computer equipment from dust, dirt, or theft. Built-in fan provides positive air pressure to both cool your equipment and protect it from dust. Top 24"Wx27"Dx20"H monitor cabinet features a Plexiglas window. Lower 25"Wx27"
- Material: Steel
- Mounting Type: Free Standing Cabinet
- Type: PC Enclosures
- Shape: Rectangular
Supplier: Pro-Line - A Division of RW Hatfield
Description: to meet your requirement and customize the workstation to your computer equipment. Buy just what you need, but rest assured, our selection will fit your station perfectly.
- Type: Industrial, Office/Home
- Work Surface: Hardwood, Stainless Steel, Plastic/Melamine Laminated, Other
- Options / Features: Back and End Stops, Back Rack, Back Shelf / Riser, Electrical Outlet(s) / Strip(s), Ergonomic Design, ESD (Electrostatic Dissipative), Foot Rest, Keyboard Tray, Light(s), Modular Design, Portable, Roll Storage / Dispenser, Storage Drawer(s), Stringer, Tack Board(s), Tilting Work surface
- Portable: Yes
Supplier: Eaton | Power Quality
Description: Top shelf accommodates up to a 95 lb. presentation screen. Includes overhead locking compartment for enclosed storage of materials.
- Type: Office/Home
- Options / Features: Portable, Storage Cabinet(s)
- Portable: Yes
Supplier: Addo Enterprises, Inc.
Description: Warranty (years) 2 Year This single-room video surveillance system comes with everything you need for complete audio and video surveillance. The CS-mount video security camera includes a 2-12mm varifocal auto-iris lens, adjustable to help you get the best view. This system features a high-quality
Description: Customizable work surfaces, shelves, and lighting, weight 34-38 lbs
- Product Type: Workbench or Workstation
- Features: Anti-Static / Electrostatic
- Type: Office/Home
- Work Surface: Plastic/Melamine Laminated, Wood Laminated
Supplier: Security Cameras Direct
Description: This 17" active matrix TFT LCD monitor can be used with various video formats. It has RCA, VGA and S-video inputs, making it perfect as a dual role computer and security monitor. The user-friendly on screen display lets you adjust contrast, brightness, clock, phase, screen position and auto adjust
- Type: LCD Display
- LCD Matrix Type: AMLCD
- LCD Technology: TFT
- Resolution: XGA (1024 x 768)
Find Suppliers by Category Top
Featured Products for Computer Security Top
McGard Special Products Division
Intimdator Computer Locks
Features: Controlled access using McGard keys with exclusive or multiple patterns available. Recessed for greater security. Positive cam Lock action. Key works as handle when lock is open and can not be removed until the lock is closed and locked. McGard utilizes proprietary technology in the design of the operating key. Keys can only be purchased from McGard insuring the integrity of your security system (read more)
Browse Locks and Locking Systems Datasheets for McGard Special Products Division
Parts by Number for Computer Security Top
|Part #||Distributor||Manufacturer||Product Category||Description|
|HSUCD-BE||Hayes Trading Co.||Built-Rite||SECURITY COMPUTER WORKSTATION||Built-Rite Security Computer Workstation | HSUCD-BE | Hayes Trading Co | 877-424-4908 - SECURITY WORKSTATION, COMPUTER STAND, LOCKING DESK, LOCKING COMPUTER | HSUCD-BE|
|HSUCD-BG||Hayes Trading Co.||Built-Rite||SECURITY COMPUTER WORKSTATION||Built-Rite Security Computer Workstation | HSUCD-BG | Hayes Trading Co | 877-424-4908 - SECURITY WORKSTATION, COMPUTER STAND, LOCKING DESK, LOCKING COMPUTER | HSUCD-BG|
|HSUCD-GY||Hayes Trading Co.||Built-Rite||SECURITY COMPUTER WORKSTATION||Built-Rite Security Computer Workstation | HSUCD-GY | Hayes Trading Co | 877-424-4908 - SECURITY WORKSTATION, COMPUTER STAND, LOCKING DESK, LOCKING COMPUTER | HSUCD-GY|
|HSCW-3060-DKGN||Hayes Trading Co.||Pucel Enterprises||SECURITY COMPUTER WORK STATION||Pucel Security Computer Work Station HSCW-3060-DKGN HayesTrading.com 877-424-4908 - Shop Desks & Work Stations, computer work station, HSCW-3060-DKGN|
|HSCW-3060-YE||Hayes Trading Co.||Pucel Enterprises||SECURITY COMPUTER WORK STATION||Pucel Security Computer Work Station HSCW-3060-YE HayesTrading.com 877-424-4908 - Shop Desks & Work Stations, computer work station, HSCW-3060-YE|
|HSCW-3060-PU||Hayes Trading Co.||Pucel Enterprises||SECURITY COMPUTER WORK STATION||Pucel Security Computer Work Station HSCW-3060-PU HayesTrading.com 877-424-4908 - Shop Desks & Work Stations, computer work station, HSCW-3060-PU|
Conduct Research Top
Essential Computer Security: Everyone 's Guide to E-Mail, Internet, and Wireless Security
Essential Computer Security: Everyone 's Guide to E-Mail, Internet, and Wireless Security. Offering jargon-free advice on operating your computer securely, this guide covers basic windows security, passwords, viruses worms, and other malware, patching, perimeter security, and much more. Books24x7
High Tech Computer Viruses, Are You Protected?
. According to the International Computer Security Association there are more than 50,000 viruses today; new viruses come out daily; and 200 new ones are created every month. High Tech Computer Viruses, Are You Protected High Tech Computer Viruses, Are You. Several years ago most viruses
Computer Power User Article - Firewall Fitness
to computer security, a little paranoia can also go a long way. A good security approach typically involves several levels, including a well-configured and secure OS, strong alphanumeric passwords, and, of course, a good firewall to protect your PC from incoming connections. Not all firewalls are created
The Invisible Computer
. Televisions. All Reviews. Video. How To. Magazine. RSS Feeds. All Wired Top Stories Magazine Wired Blogs Video. Issue 13.07 - July 2005. Subscribe to WIRED magazine and receive a FREE gift!. The Invisible Computer. Transparent circuitry could bring Windows to windows.By Wil McCarthy Previous: Addicted
Acoustic Control System Based on a Box Computer
The installation of our proprietary acoustic instrument control DA board in a box computer with expansion slots has enabled the construction of a minimum essential system at low costs. CONTEC A Focus on Quality. A Commitment to Our Environment. Global | - Region - Japan China. Change Home
Security in Distributed and Networking Systems: Computer and Network Security, Vol. 1
Security in Distributed and Networking Systems: Computer and Network Security, Vol. 1. Including security studies in a range of systems, this book provides a comprehensive treatment on security issues in distributed systems, ranging from attacks to all kinds of solutions from prevention
Computer Power User Article - Antivirus & System Security
but missing some of the handier features, such as explicitly dealing with unwanted system changes, the other programs in this roundup offer. ISS provides a strong level of antivirus protection one of the strongest in this roundup. When I copied the test samples to the target computer, they didn t survive
Equipment of the Computer Center with Cabinets
With the move of the Deutsche Börse AG to an individually designed building, the brokers have used the possibility to optimise their internal data network. The result is a system that guarantees highest availability, flexibility and future security. Server Cabinets Racks for Computer Centre. Home
Engineering Web Search: Computer Security Top
NIST.gov - Computer Security Division - Computer Security...
NIST, Computer Security Division, Computer Security Resource Center 2011 Computer Security Division Annual Report
Computer Security Computer Software Internet Computer Security Computer security is an increasingly important consideration.
UC Davis Computer Security Lab
Computer Security Lab Home Projects People
The IEEE Computer Society
Become an IEEE Computer Society member and enjoy the many great benefits designed to enhance your knowledge and advance your career -- including
Computer Magazine, Articles, Multimedia - IEEECS
About Computer Computer covers all aspects of computer science.
Category:Computer security procedures - Wikipedia, the free...
Category:Computer security procedures From Wikipedia, the free encyclopedia
Category:Computer security exploits - Wikipedia, the free...
Category:Computer security exploits From Wikipedia, the free encyclopedia
Department of Computer Science, Cornell University
Computer Labs Staff Philosophy Graduate Security Systems and Networking Theory of Computing