ANSI INCITS 467 : 2011
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 3 (SSC-3)
Hardcopy , PDF
22-04-2024
English
01-01-2011
Introduction
1 Scope
2 Normative references
3 Definitions, acronyms, keywords, and conventions
4 General Concepts
5 Explicit address command descriptions for sequential-access
devices
6 Implicit address command descriptions for sequential-access
devices
7 Common command descriptions for sequential-access devices
8 Parameters for sequential-access devices
Annex A - Application client recommendations for using
TapeAlert (informative)
Annex B - Security environment (informative)
Annex C - Example keyless copy operation flowchart
(informative)
Annex D - Sense logical block information for error conditions
(informative)
Describes the command set extensions to facilitate operation of the sequential-access device type.
DocumentType |
Standard
|
Pages |
245
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy |
ANSI INCITS 497 : 2012 | INFORMATION TECHNOLOGY - AUTOMATION/DRIVE INTERFACE COMMANDS - 3 (ADC-3) |
ANSI INCITS 484 : 2012 | INFORMATION TECHNOLOGY - SCSI MEDIA CHANGER COMMANDS - 3 (SMC-3) |
ANSI INCITS 519 : 2014 | SERIAL ATTACHED SCSI - 3 (SAS-3) |
CSA ISO/IEC 14776-413 : 2007 | INFORMATION TECHNOLOGY - SMALL COMPUTER SYSTEM INTERFACE (SCSI) - PART 413: ARCHITECTURE MODEL-3 (SAM-3) |
CSA ISO/IEC 14776-413 : 2007 : R2012 | INFORMATION TECHNOLOGY - SMALL COMPUTER SYSTEM INTERFACE (SCSI) - PART 413: ARCHITECTURE MODEL-3 (SAM-3) |
CAN/CSA-ISO/IEC 14776-413-07 (R2017) | Information Technology - Small Computer System Interface (SCSI) - Part 413: Architecture Model-3 (SAM-3) (Adopted ISO/IEC 14776-413:2007, first edition, 2007-02) |
ISO/IEC 14776-414:2009 | Information technology Small Computer System Interface (SCSI) Part 414: SCSI Architecture Model-4 (SAM-4) |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ANSI INCITS 408 : 2005 | INFORMATION TECHNOLOGY - SCSI PRIMARY COMMANDS - 3 (SPC-3) |
ISO/IEC 14776-452:2005 | Information technology Small Computer System Interface (SCSI) Part 452: SCSI Primary Commands - 2 (SPC-2) |
ANSI INCITS 402 : 2005 | INFORMATION TECHNOLOGY - SCSI ARCHITECTURE MODEL - 3 (SAM-3) |
ANSI INCITS 441 : 2008 | INFORMATION TECHNOLOGY - AUTOMATION/DRIVE INTERFACE COMMANDS - 2 (ADC-2) |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
ISO/IEC 14776-413:2007 | Information technology Small Computer System Interface (SCSI) Part 413: SCSI Architecture Model -3 (SAM-3) |
ISO/IEC 15200:1996 | Information technology Adaptive Lossless Data Compression algorithm (ALDC) |
ANSI INCITS 382 : 2004(R2018) | INFORMATION TECHNOLOGY - SCSI MEDIA CHANGER COMMAND SET VERSION 2 (SMC-2) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.