Products & ServicesSee also: Categories | Featured Products | Parts by Number | Technical Articles | Engineering Web Results
Supplier: Takex America, Inc.
Description: mechanisms. Advanced circuitry allows for detection distances for up to 30 meters without the use of laser components. AC power allows for a wide range of applications such as car washes, exposed vehicle detection systems, conveyor detection in unusual environments such as frozen fish. This group
- Technology: Polarized Retroreflective
- Fiber Optic: Plastic
- Beam: Visible
- Mode: Dark-on
Supplier: MilesTek Corporation
Description: be configured to speeds of 10/20Mbps or 100/200Mbps automatically. In addition, the product is equipped with the MDI/ MDIX auto-detection for easily plug and play connection, regardless of cabling types- straight through or crossover. The high-performance throughput at filtering/forwarding rate is up to 14,880
- Area Network Type: WAN Capable
- Protocols / Networks: 10/100 Ethernet
- Form Factor: Module
- Ports / Interfaces: RJ-45
Supplier: Zones, Inc.
Description: MiLAN's MIL-S2400S compact Fast Ethernet Switch has twenty-four 10/100 Base-TX ports with low latency and error-free performance provided via an advanced store-and-forward architecture. Cable detection and correction is automatic as the switch adjusts for straight-through or crossover cables during
- Network Equipment Type: Switch
- Ports / Interfaces: RJ-45
Find Suppliers by Category Top
Featured Products for Intrusion Detection Top
Intrusion Tact Switches
Intrusion Switches RDI Part Number RTS-1185. Slot mounts in chassis reduces cost of installation. Variable wire harness length and connector configuration based on user requirements. Available in Normally Closed or Normally Open versions. UL94V-0 rated. RoHS Compliant and Halogen Free. Typical applications include workstation PCs, alarm panels, telecommunication equipment. Ideal Applications: Control Panels. Intrusion Detection. Alarm Boxes. Telecommunications Equipment. Immediate Availability (read more)
Browse Touch Switches and Tactile Switches Datasheets for RDI, Inc.
Alpha Technologies Ltd.
Cordex PSU Power Supply Unit
with short circuit, over voltage, over temperature and over load protection. It also features advanced battery charging, monitoring and testing functionality. Two temperature, two digital and one analog inputs can be used for monitoring system alarms such as intrusion detection or equipment malfunction. The integrated CXCI+ controller offers comprehensive local and remote control and monitoring, including a web server, providing easy set up using a standard Windows Internet Explorer browser. SMTP... (read more)
Browse DC Power Systems Datasheets for Alpha Technologies Ltd.
Excelitas Technologies Corp.
PYD 1688 Low Power DigiPyro® Digital Pyrodetector
The new DigiPyro PYD 1688 was developed for use in both residential and commercial. products. It runs on a 3V power supply and features a special sleep mode operation, which helps extend battery life when a device is not in use. This results in greater efficiency in motion sensing, home automation, intrusion alarm and wireless presence detection. applications. (read more)
Browse Noncontact Infrared Temperature Sensors Datasheets for Excelitas Technologies Corp.
Takex America, Inc.
Introducing the OMS-12FE
Introducing the OMS-12FE. AKEX, the quality leader in security sensors, announced today the introduction of the OMS-12FE, a new slim profile outdoor PIR (passive infrared) intrusion detector with dual-zone detection capability. "The OMS-12FE, along with our battery powered TX-114 series sensors, complements our PIR sensor line and shares many of the desired features found in our MS-12FE PIR, such as pet immunity, tamper protection, and ease of installation. And, of course, the OMS-12FE... (read more)
Browse Motion and Occupancy Detectors Datasheets for Takex America, Inc.
Arjay Engineering Ltd.
Plugged Chutte Detector - 2852-PCD
Over 40 years of capacitance experience stands behind the 2852-PCD plugged chute detectors. The flush mount sensor continuously monitors the change from a normal material chute condition to a plugged condition. • capacitance technology responds to any material type. • no moving parts. • remote alarm unit mounts safely away from pipe. • no intrusion into chute or hopper. The 2852-PCD sensor monitors the capacitance field in front of the sensor plate. The sensing plate forms... (read more)
Browse Level Sensors Datasheets for Arjay Engineering Ltd.
Honeywell Analytics, Inc.
ACM 150 FT-IR Centralized Gas Monitoring System
the life of the instrument. Choose the ACM 150 for enhanced safety, improved performance and lower cost per point monitoring. Features & Benefits: Integrate gas detection into a single unit. Detect virtually any gas, chemical or odor in an industrial process*. Up to 40 measuring points can be detected sequentially. 80 configurable relay points for increased flexibility. Cut monitoring costs over life of device. Sealed aluminum body prevents moisture intrusion, protecting critical internal... (read more)
Browse Gas Sensors Datasheets for Honeywell Analytics, Inc.
Conduct Research Top
Snort 2.0 Intrusion Detection
Snort 2.0 Intrusion Detection. This is the first book dealing with the Snort IDS, one of the fastest-growing Intrusion Detection Systems. The text provides valuable insight into the code base of Snort and in-depth tutorials covering complex installations, configuration, and more. Books24x7
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition. This brand-new edition of the best-selling Snort book covers all the latest features of the version 2.1 upgrade to the Snort product. Books24x7 EngineeringProTM from Books24x7® Having access to accurate information
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems. This book includes complete coverage of the Cisco Secure Policy Manager (CSPM), as well as step-by-step instructions for installing, and using the Cisco Intrusion Detection Sensor. It is also helpful in preparing for Cisco
Smart Computing Article - Firewalls, Hackers & Intrusion Detection
Problem: Windows XP keeps sending me periodic messages about a third-party firewall I have installed on my system. If you want WinXP to stop sending you messages about your other firewall, you need to tell your system to stop monitoring the program. You do this by changing the settings for Windows
Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference May 30 - June 1, 2005, Chiba, Japan
, DRM and content security, computer forensics, Internet and web security, intrusion detection, and much more. Books24x7 EngineeringProTM from Books24x7® Having access to accurate information on demand is critical for your engineering projects. That's why
The Detection of Stud Line Cracking in Metal Stud Walls (.pdf)
. As the foam. cooled and began to shrink, extensive cohesive failure occurred opening the exterior wall envelope to air and moisture. intrusion. Stud line cracking for commercial walls can be difficult to detect when metal studs, typically in the shape of c-channels,. are used in construction. The stud-foam
Non-Invasive Roof Leak Detection Using Infrared Thermography
Roof leaks are typically discovered by direct observation. If the roof sheathing is not visible from below, such as in an attic, the wallboard or ceiling covering must first be removed. This removal is necessary in order to "visualize" the intrusion point at the underside of the roof sheathing
A Beginner's Guide to Cybercrime
the. difference between traditional crime and cybercrime? Do you know where the cybercrime magnets are?. And do you know why nothing with an IP address is secure and why traditional countermeasures such as firewal s, anti-virus,. and intrusion detection fail? Would you like to learn new methods
Engineering Web Search: Intrusion Detection Top
Intrusion Detection System ? Wikipedia
Intrusion Detection System aus Wikipedia, der freien Enzyklopädie Ein Intrusion Detection System (IDS) bzw.
Network intrusion detection system - Wikipedia, the free...
Network intrusion detection system From Wikipedia, the free encyclopedia
SupportConnect - Security Notice for eTrust Intrusion...
Security Notice for eTrust Intrusion Detection caller.dll vulnerability eTrust Intrusion Detection 3.0 eTrust Intrusion Detection 3.0 SP1
lf294, SystemAdministration: IDS - Intrusion Detection System,...
IDS - Intrusion Detection System, Part II In Part I we focused on typical attacks on Intrusion Detection Systems.
IDP Series Intrusion Detection and Prevention - Application...
These IDP Intrusion Detection and Prevention Appliances offer continual intrusion detection and application security management for enterprise
Snort :: Home Page
Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire.
Intrusion detection Access Control Video Security
Intrusion Detection :: Software :: WindowSecurity.com
Intrusion Detection Last Updated on 1 April 2013, Total: 8 Products Intrusion Detection GFI EventsManager Listing Updated: 1 April 2013