Registration number (WIID)Project No.TitleStatus
51620ISO/IEC 19790:2006/Cor 1:2008Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1Atcelts
51619ISO/IEC 9797-3:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-functionStandarts spēkā
51618ISO/IEC 9797-2:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
51617ISO/IEC 9798-2:1999/NP Amd 1Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Amendment 1Izstrādē
51586ISO/IEC NP 27033-7Information technology — Security techniques — Network security — Part 7: WirelessIzstrādē
51585ISO/IEC 27033-6:2016Information technology — Security techniques — Network security — Part 6: Securing wireless IP network accessStandarts spēkā
51584ISO/IEC 27033-5:2013Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)Standarts spēkā
51583ISO/IEC 27033-4:2014Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gatewaysStandarts spēkā
51582ISO/IEC 27033-3:2010Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issuesStandarts spēkā
51581ISO/IEC 27033-2:2012Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network securityStandarts spēkā
Displaying 501-510 of 770 results.