ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
40614 | ISO/IEC 15408-3:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements | Atcelts |
40614 | ISO/IEC 15408-3:2005 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
40612 | ISO/IEC 15408-1:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model | Atcelts |
40012 | ISO/IEC 18028-5:2006 | Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks | Atcelts |
40011 | ISO/IEC 18028-4:2005 | Information technology — Security techniques — IT network security — Part 4: Securing remote access | Atcelts |
40011 | ISO/IEC 18028-4:2005 | Information technology Security techniques IT network security | Atcelts |
40010 | ISO/IEC 18028-3:2005 | Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways | Atcelts |
Displaying 631-640 of 774 results.