ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 31143 | ISO/IEC 10118-1:2000 | Information technology — Security techniques — Hash-functions — Part 1: General | Atcelts |
| 62313 | ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 33441 | ISO/IEC 17799:2000 | Information technology — Code of practice for information security management | Atcelts |
| 50951 | ISO/IEC TR 20004:2012 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 | Atcelts |
| 42103 | ISO/IEC 27001:2005 | Information technology — Security techniques — Information security management systems — Requirements | Atcelts |
| 57915 | ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements | Atcelts |
| 15530 | ISO 8372:1987 | Information processing — Modes of operation for a 64-bit block cipher algorithm | Atcelts |
| 39733 | ISO/IEC TR 15443-1:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Atcelts |
| 54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
| 31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
Displaying 311-320 of 793 results.
