ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 36013 | ISO/IEC 14888-3:1998/Cor 1:2001 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1 | Atcelts |
| 21756 | ISO/IEC TR 13335-3:1998 | Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security | Atcelts |
| 42506 | ISO/IEC 27007:2011 | Information technology Security techniques Guidelines for information security management systems auditing | Atcelts |
| 46381 | ISO/IEC 17799:2005/Cor 1:2007 | Information technology - Security techniques - Code of practice for information security management; Technical Corrigendum 1 | Atcelts |
| 42505 | ISO/IEC 27006:2007 | Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 54527 | ISO/IEC 11770-5:2011 | Information technology — Security techniques — Key management — Part 5: Group key management | Atcelts |
| 59142 | ISO/IEC 24759:2014 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
| 21755 | ISO/IEC TR 13335-2:1997 | Information technology — Guidelines for the management of IT Security — Part 2: Managing and planning IT Security | Atcelts |
| 28107 | ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
| 43755 | ISO/IEC TR 27015:2012 | Information technology — Security techniques — Information security management guidelines for financial services | Atcelts |
Displaying 451-460 of 793 results.
