Registration number (WIID)Project No.TitleStatus
46470ISO/IEC 14888-3:2006/Cor 1:2007Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1Atcelts
50297ISO/IEC 27002:2005Information technology — Security techniques — Code of practice for information security managementAtcelts
40010ISO/IEC 18028-3:2005Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gatewaysAtcelts
39721ISO/IEC 9798-6:2005Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transferAtcelts
35455ISO/IEC 9796-2:2002Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanismsAtcelts
39612ISO/IEC 17799:2005Information technology Security techniques Code of practice for information security managementAtcelts
59648ISO/IEC 27036-1:2014Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and conceptsAtcelts
60366ISO/IEC 9798-3:1998/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques — Technical Corrigendum 2Atcelts
45244ISO/IEC TR 27008:2011Information technology Security techniques Guidelines for auditors on information security controlsAtcelts
45244ISO/IEC TR 27008:2011Information technology — Security techniques — Guidelines for auditors on information security controlsAtcelts
Displaying 341-350 of 793 results.