Registration number (WIID)Project No.TitleStatus
69378ISO/IEC 27001:2013/Cor 2:2015Information technology — Security techniques — Information security management systems — Requirements — Technical Corrigendum 2Atcelts
69379ISO/IEC 27002:2013/Cor 2:2015Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 2Atcelts
69403ISO/IEC NP 20897Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parametersIzstrādē
69725ISO/IEC 30111:2019Information technology — Security techniques — Vulnerability handling processesStandarts spēkā
69726ISO/IEC 15946-5:2017Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generationAtcelts
70081ISO/IEC 20085-1:2019IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 1: Test tools and techniquesStandarts spēkā
70082ISO/IEC 20085-2:2020IT Security techniques — Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules — Part 2: Test calibration methods and apparatusAtcelts
70331ISO/IEC 29184:2020Information technology — Online privacy notices and consentAtcelts
70631ISO/IEC 14888-3:2016/DAmd 1Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanismIzstrādē
70659ISO/IEC 27039:2015/CD Cor 1Information technology — Security techniques — Selection, deployment and operations of intrusion detection and prevention systems (IDPS) — Technical Corrigendum 1Izstrādē
Displaying 461-470 of 770 results.