BS ISO/IEC 19896-1:2018
|
IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements |
CAN/CSA-ISO/IEC 17825:18
|
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules (Adopted ISO/IEC 17825:2016, first edition, 2016-01-15) |
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
14/30259616 DC : 0
|
BS ISO/IEC 17825 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUE - TESTING METHODS FOR THE MTIGATION OF NON-INVASIVE ATTACK CLASSES AGAINST CRYPTOGRAPHIC MODULES |
PD ISO/TS 12812-2:2017
|
Core banking. Mobile financial services Security and data protection for mobile financial services |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC TS 20540:2018
|
Information technology — Security techniques — Testing cryptographic modules in their operational environment |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
ISO/TS 12812-2:2017
|
Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
PD ISO/IEC TS 30104:2015
|
Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements |
17/30354862 DC : 0
|
BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS |
ISO/IEC 20248:2018
|
Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure |
UNI/TS 11291-10 : 2013
|
GAS MEASUREMENT SYSTEMS - HOURLY BASED GAS METERING SYSTEMS - PART 10: SAFETY |
15/30279582 DC : 0
|
BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
ISO/IEC TS 30104:2015
|
Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements |
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015
|
Information technology — Security techniques — Storage security |
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
18/30356051 DC : DRAFT APR 2018
|
BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408 |
BS ISO/IEC 17825:2016
|
Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
17/30351732 DC : 0
|
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ISO/IEC 19896-1:2018
|
IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements |
ISO/IEC 17825:2016
|
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |