ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 41530 | ISO/IEC NP 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
| 41529 | ISO/IEC 24759:2008 | Information technology — Security techniques — Test requirements for cryptographic modules | Atcelts |
| 41312 | ISO/IEC NP 13335-5 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Izstrādē |
| 41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
| 40614 | ISO/IEC 15408-3:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements | Atcelts |
| 40614 | ISO/IEC 15408-3:2005 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
| 40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
| 40613 | ISO/IEC 15408-2:2005 | Information technology Security techniques Evaluation criteria for IT security | Atcelts |
| 40612 | ISO/IEC 15408-1:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model | Atcelts |
| 40012 | ISO/IEC 18028-5:2006 | Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks | Atcelts |
Displaying 661-670 of 807 results.
