Registration number (WIID)Project No.TitleStatus
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
64136ISO/IEC 15946-1:2008/Cor 2:2014Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General — Technical Corrigendum 2Atcelts
64120ISO/IEC 27004:2016Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluationStandarts spēkā
64014ISO/IEC 27034-1:2011/Cor 1:2014Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1Standarts spēkā
64004ISO/IEC 29150:2011/Cor 1:2014Information technology — Security techniques — Signcryption — Technical Corrigendum 1Standarts spēkā
63929ISO/IEC WD 27045Information technology — Big data security and privacy — ProcessesStandarts spēkā
63755ISO/IEC 18031:2011/Amd 1:2017Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generationAtcelts
63461ISO/IEC 27033-1:2015Information technology — Security techniques — Network security — Part 1: Overview and conceptsStandarts spēkā
63417ISO/IEC 27003:2017Information technology — Security techniques — Information security management systems — GuidanceStandarts spēkā
63411ISO/IEC 27000:2014Information technology Security techniques Information security management systems Overview and vocabularyAtcelts
Displaying 371-380 of 774 results.