Registration number (WIID)Project No.TitleStatus
50951ISO/IEC TR 20004:2012Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045Atcelts
42508ISO/IEC 27009:2016Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — RequirementsAtcelts
27633ISO/IEC 15408-2:1999Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
44735ISO/IEC 13888-3:2009Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniquesAtcelts
43754ISO/IEC 27014:2013Information technology — Security techniques — Governance of information securityAtcelts
63081ISO/IEC 27050-1:2016Information technology — Security techniques — Electronic discovery — Part 1: Overview and conceptsAtcelts
17662ISO/IEC 9798-2:1994Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithmsAtcelts
42509ISO/IEC 27010:2012Information technology — Security techniques — Information security management for inter-sector and inter-organizational communicationsAtcelts
35396ISO/IEC TR 18044:2004Information technology Security techniques Information security incident managementAtcelts
59934ISO/IEC 18014-4:2015Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sourcesAtcelts
Displaying 301-310 of 807 results.