INCITS/ISO/IEC 18043 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS |
05/30068972 DC : DRAFT JUN 2005
|
ISO/IEC FCD 18043 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS (IDS) |
05/30040757 DC : DRAFT JUN 2005
|
ISO/IEC 18028 - INFORMATION TECHNOLOGY - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
PD ISO/TR 12859:2009
|
Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
BS ISO/IEC 25012:2008
|
Software engineering. Software product quality requirements and evaluation (SQuaRE). Data quality model |
PD ISO/IEC TS 24748-1:2016
|
Systems and software engineering. Life cycle management Guidelines for life cycle management |
08/30166961 DC : DRAFT OCT 2008
|
BS ISO 24100 - PRIVACY - THE BASIC PRINCIPLES FOR PROBE PERSONAL DATA PROTECTION |
DD IEC/PAS 62443-3:2008
|
Security for industrial process measurement and control Network and system security |
BS ISO/IEC TR 13335-4:2000
|
Information technology. Guidelines for the management of IT security Selection of safeguards |
BS ISO/IEC 17799 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 18043:2006
|
Information technology. Security techniques. Selection, deployment and operations of intrusion detection systems |
UNI ISO/IEC 25012 : 2014
|
SOFTWARE ENGINEERING - SOFTWARE PRODUCT QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - DATA QUALITY MODEL |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
I.S. EN 62628:2012
|
GUIDANCE ON SOFTWARE ASPECTS OF DEPENDABILITY (IEC 62628:2012 (EQV)) |
S.R. CWA 16026:2009
|
STANDARDISATION OF ONLINE DISPUTE RESOLUTION TOOLS |
I.S. EN ISO 27799:2016
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
TR 102 780 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
ISO/TS 17187:2013
|
Intelligent transport systems Electronic information exchange to facilitate the movement of freight and its intermodal transfer Governance rules to sustain electronic information exchange methods |
CEI EN 62628 : 2013
|
GUIDANCE ON SOFTWARE ASPECTS OF DEPENDABILITY |
BS ISO/IEC 18028-5:2006
|
Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
BS ISO/IEC 25010:2011
|
Systems and software engineering. Systems and software quality requirements and evaluation (SQuaRE). System and software quality models |
INCITS/ISO/IEC 15944-5 : 2008(R2013)
|
INFORMATION TECHNOLOGY - BUSINESS OPERATIONAL VIEW - PART 5: IDENTIFICATION AND REFERENCING OF REQUIREMENTS OF JURISDICTIONAL DOMAINS AS SOURCES OF EXTERNAL CONSTRAINTS |
UNE-EN 62628:2015
|
Guidance on software aspects of dependability |
PD ISO/TR 11633-2:2009
|
Health informatics. Information security management for remote maintenance of medical devices and medical information systems Implementation of an information security management system (ISMS) |
INCITS/ISO/IEC 17799 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO 17090-1:2013
|
Health informatics. Public key infrastructure Overview of digital certificate services |
CAN/CSA-ISO/IEC 25010:12 (R2016)
|
Systems and software engineering - Systems and software quality requirements and evaluation (SQuaRE) - System and software quality models (Adopted ISO/IEC 25010:2011, first edition, 2011-03-01) |
ISO/TR 11633-2:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 2: Implementation of an information security management system (ISMS) |
TR 102 538 : 1.1.1
|
USER GROUP; LIST OF DEFINITIONS AND ABBREVIATIONS |
UNE 71512:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
INCITS/ISO/IEC 18028-5 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
ISO/TR 11633-1:2009
|
Health informatics Information security management for remote maintenance of medical devices and medical information systems Part 1: Requirements and risk analysis |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
ISO/IEC TS 24748-1:2016
|
Systems and software engineering Life cycle management Part 1: Guidelines for life cycle management |
UNE 71511:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
UNE 71513:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
BS 7799-1(2005) : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
BS ISO/IEC 20741:2017
|
Systems and software engineering. Guideline for the evaluation and selection of software engineering tools |
PD ISO/IEC TR 24748-1:2010
|
Systems and software engineering. Life cycle management Guide for life cycle management |
BS ISO/IEC 18028-1:2006
|
Information technology. Security techniques. IT network security Network security management |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
04/30126470 DC : DRAFT DEC 2004
|
ISO/IEC 24743 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS REQUIREMENTS SPECIFICATION |
12/30186137 DC : 0
|
BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
TS 102 165-2 : 4.2.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
BS ISO 17090-3:2008
|
Health informatics. Public key infrastructure Policy management of certification authority |
CSA ISO/IEC 25010 : 2012
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - SYSTEM AND SOFTWARE QUALITY MODELS |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
IEC PAS 62443-3:2008
|
Security for industrial process measurement and control - Network and system security |
CSA ISO/IEC 18028-5 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
UNE 71510:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
ISO/IEC 18028-5:2006
|
Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks |
BS 7799-2(2005) : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
ISO/IEC 25010:2011
|
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models |
11/30251566 DC : 0
|
BS EN 62628 - GUIDANCE ON SOFTWARE ASPECTS OF DEPENDABILITY |
PD ISO/TR 11633-1:2009
|
Health informatics. Information security management for remote maintenance of medical devices and medical information systems Requirements and risk analysis |
ISO/IEC 18043:2006
|
Information technology Security techniques Selection, deployment and operations of intrusion detection systems |
BS ISO/IEC 15944-5:2008
|
Information technology. Business operational view Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
BS EN 62628:2012
|
Guidance on software aspects of dependability |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
ISO 17090-3:2008
|
Health informatics Public key infrastructure Part 3: Policy management of certification authority |
INCITS/ISO/IEC 18028-1 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
ISO/IEC 17799:2005
|
Information technology Security techniques Code of practice for information security management |
ISO 17090-1:2013
|
Health informatics Public key infrastructure Part 1: Overview of digital certificate services |
ISO 19092-1:2006
|
Financial services Biometrics Part 1: Security framework |
ISO 24100:2010
|
Intelligent transport systems Basic principles for personal data protection in probe vehicle information services |
ISO/IEC 18028-1:2006
|
Information technology Security techniques IT network security Part 1: Network security management |
ISO/IEC 15444-8:2007
|
Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62628:2012
|
Guidance on software aspects of dependability |
17/30355188 DC : 0
|
BS ISO/IEC 24748-1 - SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
PD ISO/TS 17187:2013
|
Intelligent transport systems. Electronic information exchange to facilitate the movement of freight and its intermodal transfer. Governance rules to sustain electronic information exchange methods |
05/30104603 DC : DRAFT JUN 2005
|
ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
08/30193508 DC : DRAFT NOV 2008
|
BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
ISO/IEC 15944-5:2008
|
Information technology Business operational view Part 5: Identification and referencing of requirements of jurisdictional domains as sources of external constraints |
UNI EN ISO 21091 : 2013
|
HEALTH INFORMATICS - DIRECTORY SERVICES FOR HEALTHCARE PROVIDERS, SUBJECTS OF CARE AND OTHER ENTITIES |
BS ISO 24100:2010
|
Intelligent transport systems. Basic principles for personal data protection in probe vehicle information services |
ISO/IEC 25012:2008
|
Software engineering — Software product Quality Requirements and Evaluation (SQuaRE) — Data quality model |
INCITS/ISO/IEC TR 18044 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
ISO/IEC 20741:2017
|
Systems and software engineering — Guideline for the evaluation and selection of software engineering tools |
IEEE 24748-1-2011
|
IEEE Guide--Adoption of ISO/IEC TR 24748-1:2010 Systems and Software Engineering--Life Cycle Management--Part 1: Guide for Life Cycle Management |
CSA ISO/IEC 18028-1 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CSA ISO/IEC TS 24748-1 : 2018
|
SYSTEMS AND SOFTWARE ENGINEERING - LIFE CYCLE MANAGEMENT - PART 1: GUIDELINES FOR LIFE CYCLE MANAGEMENT |
ISO/IEC TR 24748-1:2010
|
Systems and software engineering Life cycle management Part 1: Guide for life cycle management |
EN 62628:2012
|
Guidance on software aspects of dependability |
CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |