ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
59680 | ISO/IEC 27036-2:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements | Atcelts |
59649 | ISO/IEC 18033-3:2010/WD Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Russian Block Cipher GOST | Izstrādē |
59648 | ISO/IEC 27036-1:2014 | Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts | Atcelts |
59144 | ISO/IEC 27006:2011 | Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems | Atcelts |
59144 | ISO/IEC 27006:2011 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
59142 | ISO/IEC 24759:2014 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
59140 | ISO/IEC TR 15443-2:2012 | Information technology — Security techniques — Security assurance framework — Part 2: Analysis | Standarts spēkā |
59138 | ISO/IEC TR 15443-1:2012 | Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts | Standarts spēkā |
57916 | ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice | Standarts spēkā |
57915 | ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements | Standarts spēkā |
Displaying 431-440 of 774 results.