User Manual
Page 35
... from IBM. This is operated with a key. Installing options 21 Identifying security locks The following illustration will help you install do not interfere with many laptop computers. The cable lock attaches to a security slot at the rear of your computer to a desk, table, or other computer cables. Chapter 2. You can secure...
... from IBM. This is operated with a key. Installing options 21 Identifying security locks The following illustration will help you install do not interfere with many laptop computers. The cable lock attaches to a security slot at the rear of your computer to a desk, table, or other computer cables. Chapter 2. You can secure...