ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 31142 | ISO/IEC TR 13335-5:2001 | Information technology Guidelines for the management of IT Security | Atcelts |
| 31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
| 31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
| 39733 | ISO/IEC TR 15443-1:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Atcelts |
| 59138 | ISO/IEC TR 15443-1:2012 | Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts | Standarts spēkā |
| 39271 | ISO/IEC TR 15443-2:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Atcelts |
| 59140 | ISO/IEC TR 15443-2:2012 | Information technology — Security techniques — Security assurance framework — Part 2: Analysis | Standarts spēkā |
| 41693 | ISO/IEC TR 15443-3:2007 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Atcelts |
| 39690 | ISO/IEC TR 15446:2004 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
| 44715 | ISO/IEC TR 15446:2009 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
Displaying 711-720 of 807 results.
