Products & ServicesSee also: Categories | Featured Products | Technical Articles | Engineering Web Results
Supplier: Softchoice Corporation
Description: The Universal Brass Padlock from Noble Security Systems locks your Dell computer's security tab to protect all internal components of your computer. It is designed to be used with all Dell computers with a security tab.
Description: Open Text SOCKS Client is a Windows 7 certified, state-of-the-art Windows security solution that allows you to connect to hosts across firewalls. SOCKS is an industry-standard security protocol developed to allow computers on one network to connect to hosts on another network through a proxy
Supplier: Addo Enterprises, Inc.
Description: knowing that with VISEC Computer Surveillance Software you are in control. You may use your own webcam, but if you don't have one, we highly recommend the DigiGR8 webcam. This small handy USB web camera is great for home security. Like all USB web cameras it plugs in easily to your computers USB port
- Camera Function: Video
Technical Books - Computer, Network, Software, and Hardware Engineering with Applications -- 9781118181287
Description: Abstract There are many books on computers, networks, software, or hardware engineering. However, this one is different: it provides a comprehensive approach that integrates all of these components with applications. Moreover, it takes into account the people and organizations who depend
Supplier: VIA Technologies, Inc.
Description: Supports unique board id# for software based security and IP protection
- Processor / CPU Type: Other
- Chipset Type: VIA Chipset
- Storage Devices: Floppy Drive Support
- Ports: Serial Ports, Parallel Ports, USB, Other
Supplier: e-Media Plus, Inc.
Description: business needs. With a variety of form factors, price points, and technology levels, yet all with platform stability, rock-solid quality and security, industry-leading service & support, and common software image, the M Series is truly built for the way IT managers work.
- Type: Desktop / Tower
Supplier: Dassault Systemes SolidWorks Corp.
Description: to worry about when going through airport security. Create DWG files from almost any computer As long as your computer has an internet connection and is enhanced by Microsoft Silverlight, you can use it to create drafts of your ideas whenever you’re so inspired. Simply click on the Run button
Supplier: Automation Control Products (ACP)
Description: ThinManager 4.0 provides support for IP cameras. Our highly customizable program lets you choose the options that best fit your needs. Most IP Cameras that conform to the mjpeg (motion jpeg) are supported. Setup is Easy 1. You configure the camera with an IP address to add to your computer
Computer-aided Design and Computer-aided Manufacturing Software (CAD/CAM) - PLM Components -- D-CubedSupplier: Siemens PLM Software
Description: The D-Cubed components are six software libraries that can be licensed by software developers for integration into their products. The capabilities they provide include parametric sketching, part and assembly design, motion simulation, collision detection, clearance measurement and hidden line
Supplier: Designfusion, Inc.
Description: A pioneer in sheet metal cutting optimization with automatic nesting for more than 30 years, Alma is a first-rate CAD/CAM software developer, specializing in sheet metal machining, cutting and robotics, with a strong international presence, subsidiaries and a dedicated distributor’s network
Supplier: American Hofmann Corporation
Description: or standard-grade (economy model) computer, balancing software, and supporting electronics Signal processor designed specifically for balancing applications Superior processing, memory, and data storage Touchscreen on some models, mouse or keyboard control Trouble-free interface ensured by DIN
Computer-aided Design and Computer-aided Manufacturing Software (CAD/CAM) - eB Insight SharePoint Connection ServicesSupplier: Bentley Systems, Inc.
Description: silos, even across multiple organizations, and be visible in eB Insight – whether through the SharePoint UI or eB Insight – to those users authorized to view and/or change it. Information sharing features within eB Insight are supported by its highly granular security model. All users
Find Suppliers by Category Top
Featured Products for Computer Security Software Top
Plex Systems, Inc.
Plex Systems for the Metalforming industry
traditional role in management and finance to encompass manufacturing operations, including production management, inventory management, quality management, and much more. Plex Online manufacturing ERP software provides unparalleled coverage and access to operational intelligence, enabling managers to make decisions based on real-time data, and enabling continuous improvement and lean management. Software Areas. IT Services. Integrated Technologies. Security. Implementation Services. Enterprise Resource... (read more)
Browse Computer-aided Design and Computer-aided Manufacturing Software (CAD/CAM) Datasheets for Plex Systems, Inc.
System-level Electronics Design Environment
of leading-edge software and consulting services for electrical and electronic design and manufacturing. Founded in 1976, Zuken has the longest track record of technological innovation and financial stability in the electronic design automation (EDA) software industry. The company's extensive experience, technological expertise and agility, combine to create world-class software solutions. Zuken's transparent working practices and integrity in all aspects of business produce long-lasting and successful... (read more)
Browse Computer-aided Engineering Software (CAE) Datasheets for Zuken
Conduct Research Top
Embedded Computers in Substation Automation (.pdf)
paper discusses how embedded computer systems can provide reliable automation for power substation networks. Microsoft Word - MOXA_White_Paper---Embedded_Computers_in_Substation_Automation.doc Moxa White Paper. Embedded Computers for Substation Automation. Daisy Dai, Product Marketing
Embedded Computers Introduced to Production Lines
Acquisition & Control. DAQ Software & Utilities. Communication. Bus Expansion. Remote I/O. Industrial LAN & Wireless. Inductive Power Distribution. Solutions. System Integration. Digital Signage Solutions. Medical Solutions. Security Solutions. Smart Grid & Energy. Test & Measurement. Manufacturing Automation
Embedded Computers for Integrated Railway Communication
Cellular. OnCell Management Software. Wireless LAN Antennas. Cellular Antennas. Wireless Accessories. Industrial Computing. Embedded Computers. Wide Temperature Computers. Wireless Embedded Computers. Power Automation Computers. Railway Computers. Marine & Panel Computers. RCore Software. Product
Embedded Computers for Real-time Monitoring in the Mining Industry
. Industrial Cellular. OnCell Management Software. Wireless LAN Antennas. Cellular Antennas. Wireless Accessories. Industrial Computing. Embedded Computers. Wide Temperature Computers. Wireless Embedded Computers. Power Automation Computers. Railway Computers. Marine & Panel Computers. RCore Software. Product
Physical Network Security
. in someone's pocket. 724-746-5500 | blackbox.com. Page 4. Physical Network Security. Why physical access to computers is a problem. Unrestricted physical access to a computer or a network is your number one security threat. If a hacker has physical access to your. network, stealing information is easy
Demonstrating Software Reliability (.pdf)
. In addition, systems engineers tend to be very comfortable in dealing with the reliability of Hardware (in terms of MTBF and MTTR). Software is not so mature in the field of measured reliability. This is a cause for concern, as Software is the cause of at least as many system failures as Hardware
The Many Faces of Security (.pdf)
generated constantly) that are scanned. the information to be sent or received is of a sensitive. by anti-virus software. Such viruses can cause a lot of. nature, such as a private e-mail or a credit card or social. damage before effective countermeasures are put in. security number. In this case
Wireless Security with IEEE 802.11
If you're new to wireless, the first thing you should realize is that the signals you send and receive from a nearby access point are easily intercepted by anyone in the vicinity who has a wireless card and a computer. The purpose of WLAN security techniques is to render the connection unusable
Engineering Web Search: Computer Security Software Top
Siemens USA - Software, Security & Systems
Software, Security & Systems Skip over Site Identifier Software, Security & Systems Software, Security & Systems
Desktop Security Software | Antivirus Software | Top Software...
Layered Security Model | Valuable Data | Anti Malware | Data Backup | Email Security | Web Security | Wireless Security | User Education | Security
Free Computer Security - Personal Software Inspector (PSI) -...
Free computer security Stay secure by updating insecure programs on your computer with the Secunia Personal Software Inspector (PSI)
The Microsoft Windows Malicious Software Removal Tool helps...
run the tool, and what happens when the tool finds malicious software on your computer.
Computer-aided software engineering - Wikipedia, the free...
Computer-aided software engineering (CASE) is the scientific application of a set of tools and methods to a software system which results in
Software engineering - Wikipedia, the free encyclopedia
Software engineering (SE) is the application of a systematic, disciplined, quantifiable approach to the design, development, operation, and
Guidance Software is recognized globally as a world leader in Digital Forensics, Cyber Security, and E-Discovery solutions.
Free Software Directory
The Free Software Directory From Free Software Directory security software-development system-administration