I.S. EN ISO 19011:2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
12/30236518 DC : 0
|
BS ISO/IEC 27000 - INFORMATION SECURITY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
I.S. ISO/IEC 27001:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
BS EN ISO/IEC 27041:2016
|
Information technology. Security techniques. Guidance on assuring suitability and adequacy of incident investigative method |
PD ISO/TR 12859:2009
|
Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
ANSI X9.111 : 2011
|
FINANCIAL SERVICES - PENETRATION TESTING WITHIN THE FINANCIAL SERVICES INDUSTRY |
CSA ISO/IEC 21827 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SYSTEMS SECURITY ENGINEERING - CAPABILITY MATURITY MODEL (SSE-CMM) |
12/30269414 DC : 0
|
BS EN 16495 - AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
DIN EN ISO/IEC 27001:2017-06
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
CSA ISO/IEC 27000 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
15/30319488 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
05/30040757 DC : DRAFT JUN 2005
|
ISO/IEC 18028 - INFORMATION TECHNOLOGY - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
ISO 19011:2011
|
Guidelines for auditing management systems |
CAN/CSA-ISO/IEC 27033-1:16
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts (Adopted ISO/IEC 27033-1:2015, second edition, 2015-08-15) |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
PD ISO/TR 18638:2017
|
Health informatics. Guidance on health information privacy education in healthcare organizations |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
ISO/IEC 27036-2:2014
|
Information technology Security techniques Information security for supplier relationships Part 2: Requirements |
PD ISO/IEC/TR 15026-1:2010
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
BS EN ISO/IEC 27000:2017
|
Information technology. Security techniques. Information security management systems. Overview and vocabulary |
UNI EN ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
ISO/IEC 27000:2018
|
Information technology — Security techniques — Information security management systems — Overview and vocabulary |
15/30299325 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
DIN ISO/IEC 27001 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 + COR. 1:2014) |
DIN EN ISO/IEC 27001 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
BS ISO/IEC 27041 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
14/30260166 DC : 0
|
BS ISO/IEC 27041 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHODS |
16/30286013 DC : 0
|
BS ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - GUIDANCE |
DIN ISO/IEC 27000:2015-12 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
BIP 0140 : 2014
|
UNDERSTANDING THE NEW ISO MANAGEMENT SYSTEM REQUIREMENTS |
09/30168526 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY - PART 1: GUIDELINES FOR NETWORK SECURITY |
UNI CEI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
08/30133461 DC : 0
|
ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
17/30354834 DC : 0
|
BS EN ISO 19011 - GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CAN/CSA-ISO/IEC 27013:16
|
Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 (Adopted ISO/IEC 27013:2015, second edition, 2015-12-01) |
BS ISO/IEC 27003:2017
|
Information technology. Security techniques. Information security management systems. Guidance |
BS ISO/IEC 27000 : 2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
13/30284691 DC : 0
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY |
CAN/CSA-ISO/IEC 27031:13 (R2017)
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity (Adopted ISO/IEC 27031:2011, first edition, 2011-03-01) |
BS ISO/IEC 27035-1:2016
|
Information technology. Security techniques. Information security incident management Principles of incident management |
CSA ISO/IEC 27035 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 27035 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CEI UNI ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
I.S. EN ISO/IEC 27043:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES (ISO/IEC 27043:2015) |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
EN ISO 19011:2011 COR 2011
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS (ISO 19011:2011) |
ISO/IEC TR 27016:2014
|
Information technology Security techniques Information security management Organizational economics |
CSA ISO/IEC TR 15026-1 : 2013
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
ISO/IEC 27013:2015
|
Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
ISO/IEC 27043:2015
|
Information technology Security techniques Incident investigation principles and processes |
VDI/VDE 2182 Blatt 1:2011-01
|
IT-security for industrial automation - General model |
CSA ISO/IEC 27007 : 2013 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BS ISO/IEC 27035:2011
|
Information technology. Security techniques. Information security incident management |
17/30342692 DC : 0
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BIP 0139 : 2013
|
AN INTRODUCTION TO ISO/IEC 27001:2013 |
14/30278505 DC : 0
|
BS ISO/IEC 27033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NETWORK SECURITY PART 1: OVERVIEW AND CONCEPTS |
10/30184432 DC : 0
|
BS ISO/IEC 27035 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
UNE-EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
TS 118 111 : 2.4.1
|
ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
GS ISI 005 : 1.1.1
|
INFORMATION SECURITY INDICATORS (ISI); GUIDELINES FOR SECURITY EVENT DETECTION TESTING AND ASSESSMENT OF DETECTION EFFECTIVENESS |
ISO/IEC TR 27015:2012
|
Information technology Security techniques Information security management guidelines for financial services |
BS ISO/IEC 21827:2008
|
Information technology. Security techniques. Systems security engineering. Capability maturity model (SSE- CMM) |
ISO/IEC 27031:2011
|
Information technology Security techniques Guidelines for information and communication technology readiness for business continuity |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 27031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION AND COMMUNICATION TECHNOLOGY READINESS FOR BUSINESS CONTINUITY |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
I.S. EN ISO/IEC 27000:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY (ISO/IEC 27000:2016) |
CSA ISO 19011 : 2012 : R2017
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
TR 103 331 : 1.1.1
|
CYBER; STRUCTURED THREAT INFORMATION SHARING |
BS EN 16495:2014
|
Air Traffic Management. Information security for organisations supporting civil aviation operations |
UNI EN 16495 : 2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANIZATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
ISO/IEC 27035:2011
|
Information technology Security techniques Information security incident management |
ISO/IEC 21827:2008
|
Information technology Security techniques Systems Security Engineering Capability Maturity Model (SSE-CMM) |
EN ISO/IEC 27042:2016
|
Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015) |
EN ISO/IEC 27043:2016
|
Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
BS ISO/IEC 27036-3:2013
|
Information technology. Security techniques. Information security for supplier relationships Guidelines for information and communication technology supply chain security |
12/30250178 DC : 0
|
BS ISO/IEC 27036-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 3: GUIDELINES FOR ICT SUPPLY CHAIN SECURITY |
10/30162769 DC : DRAFT NOV 2010
|
BS ISO/IEC 27007 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
BS ISO/IEC 27043 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
12/30250175 DC : 0
|
BS ISO/IEC 27036-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY FOR SUPPLIER RELATIONSHIPS - PART 2: COMMON REQUIREMENTS |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
BS ISO/IEC 15026-1:2013
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
BIP 0071 : 2014
|
GUIDELINES ON REQUIREMENTS AND PREPARATION FOR ISMS CERTIFICATION BASED ON ISO/IEC 27001 |
BS ISO/IEC 27007:2017
|
Information technology. Security techniques. Guidelines for information security management systems auditing |
12/30192064 DC : 0
|
BS ISO/IEC 27001 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - REQUIREMENTS |
13/30268559 DC : 0
|
BS ISO/IEC 15026-1 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
BS EN ISO/IEC 27001:2017
|
Information technology. Security techniques. Information security management systems. Requirements |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
ISO/IEC 27036-3:2013
|
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security |
BS EN ISO/IEC 27043:2016
|
Information technology. Security techniques. Incident investigation principles and processes |
CAN/CSA-ISO/IEC 30100-2:18
|
Information technology — Home network resource management — Part 2: Architecture (Adopted ISO/IEC 30100-2:2016, first edition, 2016-04) |
BS ISO/IEC 27031:2011
|
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity |
BS ISO/IEC 27042 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
BIS IS/ISO 19011 : 2011(R2016)
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
CSA ISO/IEC 21827 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SYSTEMS SECURITY ENGINEERING - CAPABILITY MATURITY MODEL (SSE-CMM) |
I.S. EN ISO/IEC 27041:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD (ISO/IEC 27041:2015) |
INCITS/ISO/IEC 27041 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON ASSURING SUITABILITY AND ADEQUACY OF INCIDENT INVESTIGATIVE METHOD |
CSA ISO 19011 : 2012
|
GUIDELINES FOR AUDITING MANAGEMENT SYSTEMS |
BS EN ISO 19011:2011
|
Guidelines for auditing management systems |
CAN/CSA-ISO/IEC 27035-1:18
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management (Adopted ISO/IEC 27035-1:2016, first edition, 2016-11-01) |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
15/30267674 DC : 0
|
BS ISO/IEC 27035-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT - PART 1: PRINCIPLES OF INCIDENT MANAGEMENT |
I.S. EN ISO/IEC 27001:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS (ISO/IEC 27001:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
UNE-ISO/IEC 27000:2014
|
Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. EN ISO/IEC 27042:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE (ISO/IEC 27042:2015) |
ISO/IEC 30100-2:2016
|
Information technology Home network resource management Part 2: Architecture |
ISO/IEC TR 15026-1:2010
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
ISO/IEC 27041:2015
|
Information technology Security techniques Guidance on assuring suitability and adequacy of incident investigative method |
ISO/IEC 27042:2015
|
Information technology Security techniques Guidelines for the analysis and interpretation of digital evidence |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
EN ISO/IEC 27000:2017
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) |
EN ISO/IEC 27001:2017
|
Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO/IEC 27041:2016
|
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015) |
EN 16495:2014
|
Air Traffic Management - Information security for organisations supporting civil aviation operations |
INCITS/ISO/IEC 27013 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDANCE ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27036-2:2014
|
Information technology. Security techniques. Information security for supplier relationships Requirements |
BS EN ISO/IEC 27042:2016
|
Information technology. Security techniques. Guidelines for the analysis and interpretation of digital evidence |
ISO/IEC 27035-1:2016
|
Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management |
CSA ISO/IEC 27007 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR INFORMATION SECURITY MANAGEMENT SYSTEMS AUDITING |
NASA CCSDS 350.7-G : ISSUE 1
|
SECURITY GUIDE FOR MISSION PLANNERS |
ISO/IEC 27007:2017
|
Information technology Security techniques Guidelines for information security management systems auditing |
GS ISI 001-1 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 1: A FULL SET OF OPERATIONAL INDICATORS FOR ORGANIZATIONS TO USE TO BENCHMARK THEIR SECURITY POSTURE |
BS ISO/IEC 27001 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
08/30146238 DC : DRAFT JUNE 2008
|
BS ISO/IEC 27000 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM - OVERVIEW AND VOCABULARY |
13/30260172 DC : 0
|
BS ISO/IEC 27043 - INVESTIGATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
INCITS/ISO/IEC 27043 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INCIDENT INVESTIGATION PRINCIPLES AND PROCESSES |
11/30207802 DC : 0
|
BS ISO/IEC 27013 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES ON THE INTEGRATED IMPLEMENTATION OF ISO/IEC 27001 AND ISO/IEC 20000-1 |
BS ISO/IEC 27013:2015
|
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 |
UNE-ISO/IEC 27001:2014
|
Information technology -- Security techniques -- Information security management systems -- Requirements |
PD ISO/IEC TR 27016:2014
|
Information technology. Security techniques. Information security management. Organizational economics |
14/30260169 DC : 0
|
BS ISO/IEC 27042 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE ANALYSIS AND INTERPRETATION OF DIGITAL EVIDENCE |
CAN/CSA-ISO/CEI 27001:14
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
GS ISI 002 : 1.2.1
|
INFORMATION SECURITY INDICATORS (ISI); EVENT MODEL A SECURITY EVENT CLASSIFICATION MODEL AND TAXONOMY |
I.S. EN 16495:2014
|
AIR TRAFFIC MANAGEMENT - INFORMATION SECURITY FOR ORGANISATIONS SUPPORTING CIVIL AVIATION OPERATIONS |
IEEE/ISO/IEC 15026-1-2014
|
IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
INCITS/ISO/IEC 27001 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/TR 18638:2017
|
Health informatics Guidance on health information privacy education in healthcare organizations |
UNE-EN ISO 19011:2012
|
Guidelines for auditing management systems (ISO 19011:2011) |
CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |