Registration number (WIID)Project No.TitleStatus
45244ISO/IEC TR 27008:2011Information technology Security techniques Guidelines for auditors on information security controlsAtcelts
40613ISO/IEC 15408-2:2005Information technology Security techniques Evaluation criteria for IT securityAtcelts
29240ISO/IEC TR 13335-4:2000Information technology Guidelines for the management of IT SecurityAtcelts
51618ISO/IEC 9797-2:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
73722ISO/IEC 29100:2011/Amd 1:2018Information technology — Security techniques — Privacy framework — Amendment 1: ClarificationsAtcelts
50482ISO/IEC 18014-2:2009Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
43753ISO/IEC 27013:2012Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
37972ISO/IEC 18033-3:2005Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphersAtcelts
46447ISO/IEC 18033-3:2005/Cor 2:2007Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 2Atcelts
59648ISO/IEC 27036-1:2014Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and conceptsAtcelts
Displaying 271-280 of 770 results.