TITLE

Index to Products

PUB. DATE
December 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2010 Supplement, Vol. 47, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article lists several security systems equipment including fire protection, asset information and computer security, and burglar alarm equipment.
ACCESSION #
56504051

 

Related Articles

  • Revisiting the Panic Button.  // SDM: Security Distributing & Marketing;Aug2001, Vol. 31 Issue 10, p39 

    Offers advice on how security dealers should install panic buttons in burglar alarms. Rules for installing panic buttons in commercial applications; Ideal mounting location for a panic button; Need to install panic buttons pains for bill traps.

  • Lock boggles the mind of car thieves. Whitward, Lane // Design Engineering;Oct95, p8 

    Features a code burglar system developed by Electronic Research & Design (ERD) in Great Britain. Combining encryption process with a moving time seed; Features of the ERD's system; Using Sunrise Electronics' single chip microcontroller to complement the design.

  • To catch a thief. Scott, Joseph // Good Housekeeping;Nov95, Vol. 221 Issue 5, p52 

    Presents advice from police sergeant Scott Hoover, head of the Crime Prevention Unit of the South Brunswick, New Jersey, Police Department, about home alarm systems. Cost of alarm systems; Comparison between direct police dialers and use of a monitoring system.

  • Relay control solves closing problems.  // SDM: Security Distributing & Marketing;Aug98, Vol. 28 Issue 11, p29 

    Presents information on ways to relay control close businesses using a programmable output from an alarm panel to trip a double pole, single throw (DPST) relay. How the systems works; Benefits of a request-to-exit button.

  • Burglar alarms.  // Consumer Reports;May94, Vol. 59 Issue 5, p329 

    Presents criteria in choosing a proper home-security system. Wired versus wireless system; Do-it-yourself versus professionally installed systems; Checking the control units of the system; Subscribing to a monitoring service; Dealing with dealers and contract-signing. INSET: Security check...

  • Anatomy of an alarm system.  // Consumer Reports;May94, Vol. 59 Issue 5, p330 

    Shows how a burglar alarm system works. Division of a dwelling into zones; Perimeter versus area sensors; Microwave detectors; Passive infrared detectors; Glass-break detectors.

  • Safe as houses.  // Australian House & Garden;Jun98, Vol. 100 Issue 1, p163 

    Introduces the HPM Wireless Intruder Alarm System. Details on the system; How to use it; Cost of the system.

  • Phone line monitor. Melton, James // Electronics Now;Mar1997, Vol. 68 Issue 3, p46 

    Presents instructions on how to build the Phone Line Monitor, an anti-burglary alarm that detects if the phone line has been cut. Design of the circuit; Schematic diagram; Operation of the alarm. INSET: A small view of telephone history..

  • Emerging alarm verification technology helps bring order out of chaos. Keosayian, Ray // Long Island Business News (7/1993 to 5/2009);3/25/96, Vol. 43 Issue 13, p28 

    Reports on the benefits of alarm verification technology on the security alarm systems in Long Island, New York. Impact of false alarms on the law enforcement authorities; Introduction of visual verification.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics