Registration number (WIID)Project No.TitleStatus
64138ISO/IEC 27013:2015Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
40012ISO/IEC 18028-5:2006Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networksAtcelts
39733ISO/IEC TR 15443-1:2005Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and frameworkAtcelts
39978ISO/IEC 18033-4:2005Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersAtcelts
66806ISO/IEC 27002:2013/Cor 1:2014Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1Atcelts
54534ISO/IEC 27001:2013Information technology — Security techniques — Information security management systems — RequirementsAtcelts
56889ISO/IEC 27039:2015Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS)Atcelts
17663ISO/IEC 9798-3:1993Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithmAtcelts
61498ISO/IEC 27018:2014Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processorsAtcelts
Displaying 381-390 of 793 results.