University access. (computerized ID system): An article from: Security Management
Book Details
Author(s)Teresa Anderson
ISBN / ASINB00093HCJ0
ISBN-13978B00093HCJ2
AvailabilityAvailable for download now
MarketplaceUnited States 🇺🇸
Description
This digital document is an article from Security Management, published by American Society for Industrial Security on January 1, 1995. The length of the article is 862 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.
From the supplier: A university has successfully solved its security problem by replacing its aging ID system with one involving the use of a PC-based database from Claris called FileMaker PRO and FARGO Electronics Inc.'s Persona ID Card Printer. This software-hardware combination had the added flexibility of integrating with older systems. The university hopes to expand the system's use to charge food bought at the campus cafeteria and books borrowed from the libary.
Citation Details
Title: University access. (computerized ID system)
Author: Teresa Anderson
Publication:Security Management (Refereed)
Date: January 1, 1995
Publisher: American Society for Industrial Security
Volume: v39 Issue: n1 Page: p18(1)
Distributed by Thomson Gale
From the supplier: A university has successfully solved its security problem by replacing its aging ID system with one involving the use of a PC-based database from Claris called FileMaker PRO and FARGO Electronics Inc.'s Persona ID Card Printer. This software-hardware combination had the added flexibility of integrating with older systems. The university hopes to expand the system's use to charge food bought at the campus cafeteria and books borrowed from the libary.
Citation Details
Title: University access. (computerized ID system)
Author: Teresa Anderson
Publication:Security Management (Refereed)
Date: January 1, 1995
Publisher: American Society for Industrial Security
Volume: v39 Issue: n1 Page: p18(1)
Distributed by Thomson Gale


