18/30361485 DC : 0
|
BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
17/30318701 DC : 0
|
BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
ISO/IEC 27018:2014
|
Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
INCITS/ISO/IEC 29115 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
BS ISO/IEC 29115:2013
|
Information technology. Security techniques. Entity authentication assurance framework |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
17/30349181 DC : 0
|
BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
10/30143797 DC : 0
|
BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 24760-1:2011
|
Information technology. Security techniques. A framework for identity management Terminology and concepts |
18/30331887 DC : 0
|
BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
ISO/IEC 19286:2018
|
Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
BS ISO/IEC 19286:2018
|
Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
DIN EN ISO/IEC 27002:2017-06
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/IEC 24760-1:2011
|
Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
BS ISO/IEC 27018:2014
|
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
12/30168696 DC : 0
|
BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
ISO/IEC TR 30117:2014
|
Information technology Guide to on-card biometric comparison standards and applications |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS EN ISO 27799:2008
|
Health informatics. Information security management in health using ISO/IEC 27002 |
ISO/IEC 24760-3:2016
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
CAN/CSA-ISO/IEC 18305:18
|
Information technology — Real time locating systems — Test and evaluation of localization and tracking systems (Adopted ISO/IEC 1830 5:2016, first edition, 2016-11-01) |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 29115:2013
|
Information technology Security techniques Entity authentication assurance framework |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
ISO/IEC 18305:2016
|
Information technology — Real time locating systems — Test and evaluation of localization and tracking systems |
DIN ISO/IEC 27018:2017-08
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
INCITS/ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CAN/CSA-ISO/IEC 24760-3:18
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
UNI CEI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |