ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
45170 | ISO/IEC 29147:2014 | Information technology — Security techniques — Vulnerability disclosure | Atcelts |
52087 | ISO/IEC 18031:2005/Cor 1:2009 | Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 | Atcelts |
45151 | ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols | Atcelts |
53472 | ISO/IEC 9798-6:2005/Cor 1:2009 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer — Technical Corrigendum 1 | Atcelts |
39066 | ISO/IEC 13335-1:2004 | Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management | Atcelts |
29240 | ISO/IEC TR 13335-4:2000 | Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | Atcelts |
73722 | ISO/IEC 29100:2011/Amd 1:2018 | Information technology — Security techniques — Privacy framework — Amendment 1: Clarifications | Atcelts |
64143 | ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations | Atcelts |
39066 | ISO/IEC 13335-1:2004 | Information technology Security techniques Management of information and communications technology security | Atcelts |
42105 | ISO/IEC 27003:2010 | Information technology — Security techniques — Information security management system implementation guidance | Atcelts |
Displaying 341-350 of 774 results.