ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 55585 | ISO/IEC 27034-5:2017 | Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure | Standarts spēkā |
| 55584 | ISO/IEC NP 27034-4 | Information technology — Security techniques — Application security — Part 4: Application security validation | Standarts spēkā |
| 55583 | ISO/IEC 27034-3:2018 | Information technology — Application security — Part 3: Application security management process | Standarts spēkā |
| 55582 | ISO/IEC 27034-2:2015 | Information technology — Security techniques — Application security — Part 2: Organization normative framework | Standarts spēkā |
| 55579 | ISO/IEC NP 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 55578 | ISO/IEC NP 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 55577 | ISO/IEC NP 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
| 54945 | ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation | Atcelts |
| 54788 | ISO/IEC 9796-2:2010 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms | Standarts spēkā |
| 54534 | ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements | Atcelts |
Displaying 481-490 of 793 results.
