Contents
Table 5.27 | Relationship between combination of Identifier and Security |
|
| level, and operation of the lock function |
|
Table 5.28 | Contents of security password | |
Table 5.29 Data format of Read Log Ext log page 10h | ||
Table 5.30 | Tag field information | |
Table 5.31 | Command code and parameters |
xviii |