HID Global

Results: 149



#Item
51Flex System in Action  CyberAudit Management Software Bridging the gap between hardwired and key-centric security solutions.  Expandable

Flex System in Action CyberAudit Management Software Bridging the gap between hardwired and key-centric security solutions. Expandable

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-04-23 05:43:32
52CyberLock ® Flex System Door & I/O Module  All the benefits of the CyberLock key-centric system of intelligent locks

CyberLock ® Flex System Door & I/O Module All the benefits of the CyberLock key-centric system of intelligent locks

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-04-23 05:43:39
53iclass-se-decor-reader-flyer-en-press_01.indd

iclass-se-decor-reader-flyer-en-press_01.indd

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2012-10-05 04:10:58
54EMBEDDED TECHNOLOGY SOLUTIONS  P RE L I M I N ARY P R O D U C T I N FO R M AT I O N iCLASS SE® Reader Module

EMBEDDED TECHNOLOGY SOLUTIONS P RE L I M I N ARY P R O D U C T I N FO R M AT I O N iCLASS SE® Reader Module

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2012-11-12 04:23:01
55research_report_LAA_new.PDF

research_report_LAA_new.PDF

Add to Reading List

Source URL: www.laa.asn.au

Language: English - Date: 2009-09-27 17:59:16
56Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society  Asset Management Solution Based on RFID By Toshiyuki TSUJI,* Seiji KOUNO,† Jun NOGUCHI,‡ Masao IGUCHI,‡ Narihiro MISU‡ and Masa

Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society Asset Management Solution Based on RFID By Toshiyuki TSUJI,* Seiji KOUNO,† Jun NOGUCHI,‡ Masao IGUCHI,‡ Narihiro MISU‡ and Masa

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:34:51
57Technology Basics White Paper  How an HID Card is “Read” The purpose of this paper is to briefly explain the nature of the data on an HID card and the steps required to get that data to the controller and unlock a d

Technology Basics White Paper How an HID Card is “Read” The purpose of this paper is to briefly explain the nature of the data on an HID card and the steps required to get that data to the controller and unlock a d

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-24 06:51:50
58Datacard SP75+ System Brochure | ID Zone

Datacard SP75+ System Brochure | ID Zone

Add to Reading List

Source URL: www.idzone.com

Language: English - Date: 2014-07-08 12:34:11
59AM-DPR – Dual Formatted Proximity Credential Reader Specifications and Installation Instructions Linear Model AM-DPR Proximity Reader is designed for use with Access Control Systems. The AM-DPR is easy to install, rugg

AM-DPR – Dual Formatted Proximity Credential Reader Specifications and Installation Instructions Linear Model AM-DPR Proximity Reader is designed for use with Access Control Systems. The AM-DPR is easy to install, rugg

Add to Reading List

Source URL: www.linearcorp.com

Language: English - Date: 2011-10-24 12:06:18
60PRINTER’S INSTRUCTIONS: INSTR,INSTL,ACT-31DH/34DH; LINEAR P/N: [removed]A; INK: BLACK; MATERIAL: 20# MEAD BOND; SIZE: 8.500” x 5.500”; SCALE: 1-1 ACT-31DH ACT-34DH TRANS

PRINTER’S INSTRUCTIONS: INSTR,INSTL,ACT-31DH/34DH; LINEAR P/N: [removed]A; INK: BLACK; MATERIAL: 20# MEAD BOND; SIZE: 8.500” x 5.500”; SCALE: 1-1 ACT-31DH ACT-34DH TRANS

Add to Reading List

Source URL: www.linearcorp.com

Language: English - Date: 2011-07-29 12:16:15