Registration number (WIID)Project No.TitleStatus
45637ISO/IEC 10118-2:2000/Cor 2:2007Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 2Atcelts
42506ISO/IEC 27007:2011Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
69379ISO/IEC 27002:2013/Cor 2:2015Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2Atcelts
39612ISO/IEC 17799:2005Information technology — Security techniques — Code of practice for information security managementAtcelts
30830ISO/IEC 18045:2005Information technology — Security techniques — Methodology for IT security evaluationAtcelts
44884ISO/IEC 10118-2:2000/Cor 1:2006Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1Atcelts
76559ISO/IEC 27018:2019Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processorsAtcelts
62313ISO/IEC 27006:2015Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systemsAtcelts
66558ISO/IEC 18031:2011/Cor 1:2014Information technology — Security techniques — Random bit generation — Technical Corrigendum 1Atcelts
23230ISO/IEC 13888-2:1998Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniquesAtcelts
Displaying 451-460 of 791 results.