Registration number (WIID)Project No.TitleStatus
43755ISO/IEC TR 27015:2012Information technology — Security techniques — Information security management guidelines for financial servicesAtcelts
43754ISO/IEC 27014:2013Information technology — Security techniques — Governance of information securityAtcelts
43753ISO/IEC 27013:2012Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
43753ISO/IEC 27013:2012Information technology — Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1Atcelts
43752ISO/IEC WD 27012Information technology - Security techniques — ISM guidelines for e-government servicesIzstrādē
43751ISO/IEC 27011:2008Information technology — Security techniques — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002Atcelts
43656ISO/IEC 14888-3:2006Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanismsAtcelts
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
42723ISO/IEC WD 19772Information technology — Security techniques — Authenticated encryptionIzstrādē
42715ISO/IEC 11770-2:1996/Cor 1:2005Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1Atcelts
Displaying 631-640 of 807 results.