
Title: C74AMST CreationDate: 06/23/93 17:09:07
Chapter 3. Using the Security Features
This chapter contains information on how you can protect your Dock I against theft or unauthorized use. There are two ways to secure the Dock I; use the security lock or attach the it to a work surface.
This chapter contains: |
|
Using the Security Lock | |
Security Lock Description | |
Key Positions and Their Functions | |
Securing the Dock I with the Security Hook | |
Ordering Additional Security Lock Keys |
Copyright IBM Corp. 1993 |