ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
43758 | ISO/IEC NP 27018 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
43757 | ISO/IEC 27017:2015 | Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services | Standarts spēkā |
43756 | ISO/IEC TR 27016:2014 | Information technology — Security techniques — Information security management — Organizational economics | Standarts spēkā |
43755 | ISO/IEC TR 27015:2012 | Information technology — Security techniques — Information security management guidelines for financial services | Atcelts |
43754 | ISO/IEC 27014:2013 | Information technology — Security techniques — Governance of information security | Atcelts |
43753 | ISO/IEC 27013:2012 | Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 | Atcelts |
43753 | ISO/IEC 27013:2012 | Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 | Atcelts |
43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
43751 | ISO/IEC 27011:2008 | Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 | Atcelts |
43656 | ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Atcelts |
Displaying 591-600 of 770 results.