Registration number (WIID)Project No.TitleStatus
43753ISO/IEC 27013:2012Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
43752ISO/IEC WD 27012Information technology - Security techniques — ISM guidelines for e-government servicesIzstrādē
43751ISO/IEC 27011:2008Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002Atcelts
43656ISO/IEC 14888-3:2006Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
42723ISO/IEC WD 19772Information technology — Security techniques — Authenticated encryptionIzstrādē
42715ISO/IEC 11770-2:1996/Cor 1:2005Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
42509ISO/IEC 27010:2012Information technology — Security techniques — Information security management for inter-sector and inter-organizational communicationsAtcelts
42508ISO/IEC 27009:2016Information technology — Security techniques — Sector-specific application of ISO/IEC 27001 — RequirementsAtcelts
42506ISO/IEC 27007:2011Information technology Security techniques Guidelines for information security management systems auditingAtcelts
Displaying 601-610 of 774 results.