Products & ServicesSee also: Categories | Featured Products | Parts by Number | Technical Articles | Engineering Web Results
Supplier: Atmel Corporation
Description: A fully integrated security module designed to integrate into computer systems and other embedded systems. Conforms to Trusted Computing Group (TCG) v1.2 specifications.
Description: , measuring and control sectors as well as proving a highly reliable cable for process-control and security systems. The copper screening assures a disturbance-free data and signal transmission for measuring and control systems. EMC = Electromagnetic compatibillity To optimise the EMC features we
- Product Category: Bulk Cable
Supplier: Dassault Systemes SolidWorks Corp.
Description: about when going through airport security. Create DWG files from almost any computer As long as your computer has an internet connection and is enhanced by Microsoft Silverlight, you can use it to create drafts of your ideas whenever you’re so inspired. Simply click on the Run button
Standards and Technical Documents - Information technology -- Vocabulary -- Part 1: Fundamental terms -- ISO/IEC 2382-1:1993
Description: Presents, in English and French, 144 terms in the following fields: general terms, information representation, hardware, software, programming, applications and end user, computer security, data management. In order to facilitate their translation into other languages, the definitions are drafted
Supplier: McGard Special Products Division
Description: Features: Controlled access using McGard keys with exclusive or multiple patterns available Recessed for greater security Positive cam Lock action Key works as handle when lock is open and can not be removed until the lock is closed and locked McGard utilizes proprietary technology
Supplier: Omron Electronic Components LLC
Description: for use in telecommunications, security and computer equipment.
- Relay Type: General Application Relay
- Mounting: PC Board
- Pole Specifications: Double Pole (DP)
- Throw Specifications: Double Throw
Supplier: Emerson Network Power Embedded Computing
Description: The KR8-315 from Emerson Network Power is a fully integrated embedded computer. Enclosed in a custom, fanless case, the KR8-315 features the Intel® Atom™ E640 processor running at 1.0 GHz. Two versions are available – a standard temperature and an extended temperature version
Technical Books - Computationally Intelligent Hybrid Systems:The Fusion of Soft Computing and Hard Computing -- 9780471683407
Description: solutions to real-world problems. Each of the chapters illustrates the wide-ranging applicability of the fusion concept in such critical areas as: Computer security and data mining Electrical power systems and large-scale plants Motor drives and tool wear monitoring User interfaces and the World Wide Web
Find Suppliers by Category Top
Featured Products for Computer Security Top
McGard Special Products Division
Intimdator Computer Locks
Features: Controlled access using McGard keys with exclusive or multiple patterns available. Recessed for greater security. Positive cam Lock action. Key works as handle when lock is open and can not be removed until the lock is closed and locked. McGard utilizes proprietary technology in the design of the operating key. Keys can only be purchased from McGard insuring the integrity of your security system (read more)
Browse Locks and Locking Systems Datasheets for McGard Special Products Division
#12304;Taipei, Taiwan】In the view of the demand for an ultra-low power platform with fan-less design strongly inquired from customers, MSI IPC debuts the IM-PV-N based on thelatest Intel® Pineview-D D525/D425 processor and the Intel® ICH9R chipset to provide the latest ultra-low power platform. With a compact 6.7"x6.7" size, IM-PV-N is designed with rich I/O functionality and has the new levels of performance and graphics for customer's demanding in network security applications... (read more)
Browse Computer Motherboards Datasheets for MSI
Parts by Number for Computer Security Top
|Part #||Distributor||Manufacturer||Product Category||Description|
|SCW-3060||Hayes Trading Co.||PUCEL ENTERPRISES||SECURITY COMPUTER WORK STATION||Protects delicate computer equipment from many types of industrial environments. Clear plexiglass upper door with cylinder lock, keeps monitor clean and secure. Maximum protection and security rolled into one. Ventilated space for monitor and CPU....|
|SUCD||Hayes Trading Co.||BUILT-RITE BR Inc.||SECURITY COMPUTER WORKSTATION||All welded computer workstation features lower cabinet with locking doors, slide-out keyboard tray with mouse area and locking pull-down hood. Protects sensitive equipment from tampering and dust. Includes a 15-amp power strip/surge protection and...|
|859344223||ASAP Semiconductor||BOOK||Not Provided||COMPUTER SECURITY|
|MTPR15HDA||PLC Radwell||Extron||Security, Security Video Receiver||RECEIVER FOR RGB COMPUTER VIDEO AND AUDIO MINI|
|9220||Digi-Key||Keystone Electronics||Computers, Office - Components, Accessories||BRACKET COMPUTER SECURITY|
|NS208B001||PLC Radwell||Juniper Networks||Computer, Computer Accessories||NETWORK SECURITY APPLIANCE|
Conduct Research Top
Essential Computer Security: Everyone's Guide to E-Mail, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to E-Mail, Internet, and Wireless Security. Offering jargon-free advice on operating your computer securely, this guide covers basic windows security, passwords, viruses worms, and other malware, patching, perimeter security, and much more. Books24x7
High Tech Computer Viruses, Are You Protected?
. According to the International Computer Security Association there are more than 50,000 viruses today; new viruses come out daily; and 200 new ones are created every month. High Tech Computer Viruses, Are You Protected High Tech Computer Viruses, Are You. Several years ago most viruses
Computer Power User Article - Firewall Fitness
to computer security, a little paranoia can also go a long way. A good security approach typically involves several levels, including a well-configured and secure OS, strong alphanumeric passwords, and, of course, a good firewall to protect your PC from incoming connections. Not all firewalls are created
The Invisible Computer
. Televisions. All Reviews. Video. How To. Magazine. RSS Feeds. All Wired Top Stories Magazine Wired Blogs Video. Issue 13.07 - July 2005. Subscribe to WIRED magazine and receive a FREE gift!. The Invisible Computer. Transparent circuitry could bring Windows to windows.By Wil McCarthy Previous: Addicted
Acoustic Control System Based on a Box Computer
The installation of our proprietary acoustic instrument control DA board in a box computer with expansion slots has enabled the construction of a minimum essential system at low costs. CONTEC A Focus on Quality. A Commitment to Our Environment. Global | - Region - Japan China. Change Home
Security in Distributed and Networking Systems: Computer and Network Security, Vol. 1
Security in Distributed and Networking Systems: Computer and Network Security, Vol. 1. Including security studies in a range of systems, this book provides a comprehensive treatment on security issues in distributed systems, ranging from attacks to all kinds of solutions from prevention
Computer Power User Article - Antivirus & System Security
some of the handier features, such as explicitly dealing with unwanted system changes, the other programs in this roundup offer. ISS provides a strong level of antivirus protection one of the strongest in this roundup. When I copied the test samples to the target computer, they didn t survive or run
Equipment of the Computer Center with Cabinets
With the move of the Deutsche Börse AG to an individually designed building, the brokers have used the possibility to optimise their internal data network. The result is a system that guarantees highest availability, flexibility and future security. Server Cabinets Racks for Computer Centre. Home
Engineering Web Search: Computer Security Top
NIST.gov - Computer Security Division - Computer Security...
NIST, Computer Security Division, Computer Security Resource Center 2011 Computer Security Division Annual Report
Computer Security Computer Software Internet Computer Security Computer security is an increasingly important consideration.
UC Davis Computer Security Lab
Computer Security Lab Home Projects People
The IEEE Computer Society
Become an IEEE Computer Society member and enjoy the many great benefits designed to enhance your knowledge and advance your career -- including
Computer Magazine, Articles, Multimedia - IEEECS
About Computer Computer covers all aspects of computer science.
Category:Computer security procedures - Wikipedia, the free...
Category:Computer security procedures From Wikipedia, the free encyclopedia
Category:Computer security exploits - Wikipedia, the free...
Category:Computer security exploits From Wikipedia, the free encyclopedia
Department of Computer Science, Cornell University
Computer Labs Staff Philosophy Graduate Security Systems and Networking Theory of Computing