Registration number (WIID)Project No.TitleStatus
1439ISO/IEC 14888-1:1998Information technology — Security techniques — Digital signatures with appendix — Part 1: GeneralAtcelts
39066ISO/IEC 13335-1:2004Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementAtcelts
46381ISO/IEC 17799:2005/Cor 1:2007Information technology — Security techniques — Code of practice for information security management — Technical Corrigendum 1Atcelts
45169ISO/IEC 29146:2016Information technology — Security techniques — A framework for access managementAtcelts
64143ISO/IEC 27011:2016Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsAtcelts
73721ISO/IEC 19989-3:2020Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detectionAtcelts
56891ISO/IEC 27000:2012Information technology — Security techniques — Information security management systems — Overview and vocabularyAtcelts
60803ISO/IEC 27035-1:2016Information technology — Security techniques — Information security incident management — Part 1: Principles of incident managementAtcelts
66806ISO/IEC 27002:2013/Cor 1:2014Information technology — Security techniques — Code of practice for information security controls — Technical Corrigendum 1Atcelts
28232ISO/IEC 9796-2:1997Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Mechanisms using a hash-functionAtcelts
Displaying 481-490 of 793 results.