ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 44715 | ISO/IEC TR 15446:2009 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
| 44407 | ISO/IEC 27043:2015 | Information technology — Security techniques — Incident investigation principles and processes | Atcelts |
| 44406 | ISO/IEC 27042:2015 | Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence | Atcelts |
| 44405 | ISO/IEC 27041:2015 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method | Atcelts |
| 44404 | ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security | Atcelts |
| 44382 | ISO/IEC 27038:2014 | Information technology — Security techniques — Specification for digital redaction | Standarts spēkā |
| 44381 | ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence | Standarts spēkā |
| 44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
| 44379 | ISO/IEC 27035:2011 | Information technology — Security techniques — Information security incident management | Atcelts |
| 44378 | ISO/IEC 27034-1:2011 | Information technology — Security techniques — Application security — Part 1: Overview and concepts | Standarts spēkā |
Displaying 611-620 of 807 results.
