ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 46470 | ISO/IEC 14888-3:2006/Cor 1:2007 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Atcelts |
| 50297 | ISO/IEC 27002:2005 | Information technology — Security techniques — Code of practice for information security management | Atcelts |
| 40010 | ISO/IEC 18028-3:2005 | Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways | Atcelts |
| 39721 | ISO/IEC 9798-6:2005 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer | Atcelts |
| 35455 | ISO/IEC 9796-2:2002 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms | Atcelts |
| 39612 | ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management | Atcelts |
| 59648 | ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts | Atcelts |
| 60366 | ISO/IEC 9798-3:1998/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2 | Atcelts |
| 45244 | ISO/IEC TR 27008:2011 | Information technology Security techniques Guidelines for auditors on information security controls | Atcelts |
| 45244 | ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls | Atcelts |
Displaying 341-350 of 793 results.
