ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
44715 | ISO/IEC TR 15446:2009 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
39690 | ISO/IEC TR 15446:2004 | Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets | Atcelts |
41693 | ISO/IEC TR 15443-3:2007 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Atcelts |
59140 | ISO/IEC TR 15443-2:2012 | Information technology — Security techniques — Security assurance framework — Part 2: Analysis | Standarts spēkā |
39271 | ISO/IEC TR 15443-2:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Atcelts |
59138 | ISO/IEC TR 15443-1:2012 | Information technology — Security techniques — Security assurance framework — Part 1: Introduction and concepts | Standarts spēkā |
39733 | ISO/IEC TR 15443-1:2005 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Atcelts |
31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
31482 | ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services | Standarts spēkā |
31142 | ISO/IEC TR 13335-5:2001 | Information technology Guidelines for the management of IT Security | Atcelts |
Displaying 81-90 of 770 results.