INCITS/ISO/IEC 18043 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS |
15/30322573 DC : 0
|
BS ISO/IEC 33071 - INFORMATION TECHNOLOGY - PROCESS ASSESSMENT - AN INTEGRATED PROCESS CAPABILITY ASSESSMENT MODEL FOR ENTERPRISE PROCESSES |
05/30068972 DC : DRAFT JUN 2005
|
ISO/IEC FCD 18043 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SELECTION, DEPLOYMENT AND OPERATIONS OF INTRUSION DETECTION SYSTEMS (IDS) |
PD ISO/IEC TR 19791:2006
|
Information technology. Security techniques. Security assessment of operational systems |
BS EN 60255-1:2010
|
Measuring relays and protection equipment Common requirements |
PD ISO/TR 12859:2009
|
Intelligent transport systems. System architecture. Privacy aspects in ITS standards and systems |
DD ISO/TS 21547:2010
|
Health informatics. Security requirements for archiving of electronic health records. Principles |
BIP 0003 : 2003
|
INFORMATION SECURITY PD 3000 SERIES ON CD-ROM |
06/30140028 DC : 0
|
EN 50136-1-5 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS AND EQUIPMENT - PART 1-5: REQUIREMENTS FOR PACKET SWITCHED NETWORK PSN |
CSA ISO TS 17090-2 : 2005
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 2: CERTIFICATE PROFILE |
05/30040757 DC : DRAFT JUN 2005
|
ISO/IEC 18028 - INFORMATION TECHNOLOGY - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CAN/CSA-IEC 62443-2-1:17
|
Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
10/30207796 DC : 0
|
BS ISO/IEC 15289 - SOFTWARE AND SYSTEMS ENGINEERING - CONTENT OF LIFE-CYCLE INFORMATION PRODUCTS |
03/652482 DC : DRAFT JUNE 2003
|
BS ISO/IEC 13335-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MANAGEMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY - PART 1: CONCEPTS AND MODELS FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY MANAGEMENT |
13/30293476 DC : 0
|
BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
I.S. ISO 10005:2005
|
QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
08/30145964 DC : DRAFT SEP 2008
|
BS ISO/IEC 24713-3 - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 3: BIOMETRIC PROFILE FOR SEAFARERS |
PD 3005:2002
|
GUIDE ON THE SELECTION OF BS 7799-2 CONTROLS |
CSA ISO 10014 : 2006 : R2016
|
QUALITY MANAGEMENT - GUIDELINES FOR REALIZING FINANCIAL AND ECONOMIC BENEFITS |
INCITS/ISO/IEC 18028-3 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 3: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
DD IEC PAS 62601 : DRAFT MAR 2009
|
INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
BS ISO/IEC 18043:2006
|
Information technology. Security techniques. Selection, deployment and operations of intrusion detection systems |
PD ISO/IEC TR 18044:2004
|
Information technology. Security techniques. Information security incident management |
BIS SP 69 : 2012
|
FINANCIAL SERVICES - INFORMATION SECURITY GUIDELINES |
CSA ISO 10014:2006
|
QUALITY MANAGEMENT - GUIDELINES FOR REALIZING FINANCIAL AND ECONOMIC BENEFITS |
I.S. CWA 14842-3:2003
|
ELECTRONIC COMMERCE - SHOP PRESENTATION AND TRANSACTIONS - PART 3: ICT SECURITY REQUIREMENTS |
CAN/CSA-IEC/TR 62443-3-1:17
|
Industrial communication networks — Network and system security — Part 3-1: Security technologies for industrial automation and control systems (Adopted IEC technical report 62443-3-1:2009, first edition, 2009-07) |
I.S. CWA 14172-2:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 2: CERTIFICATION AUTHORITY SERVICES AND PROCESSES |
IEC TR 62443-3-1:2009
|
Industrial communication networks - Network and system security - Part 3-1: Security technologies for industrial automation and control systems |
ISO 10014:2006
|
Quality management Guidelines for realizing financial and economic benefits |
CEN/TS 15260:2006
|
Health informatics - Classification of safety risks from health informatics products |
EN 62601:2016
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA |
CEI CWA 50487 : 2006
|
SMARTHOUSE CODE OF PRACTICE |
IEEE 1547.3 : 2007
|
MONITORING, INFORMATION EXCHANGE, AND CONTROL OF DISTRIBUTED RESOURCES INTERCONNECTED WITH ELECTRIC POWER SYSTEMS |
BS ISO 19153:2014
|
Geospatial Digital Rights Management Reference Model (GeoDRM RM) |
BS ISO/IEC 18028-5:2006
|
Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
ISO 22307:2008
|
Financial services Privacy impact assessment |
PD ISO/TR 27809:2007
|
Health informatics. Measures for ensuring patient safety of health software |
11/30189374 DC : 0
|
BS ISO 19153 - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
PD IEC/TR 62351-10:2012
|
Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
BS ISO 16363:2012
|
Space data and information transfer systems. Audit and certification of trustworthy digital repositories |
DD ISO/TS 25238:2007
|
Health informatics. Classification of safety risks from health software |
07/30162048 DC : 0
|
BS ISO/IEC 29382 - CORPORATE GOVERNANCE OF INFORMATION AND COMMUNICATION TECHNOLOGY |
PD ISO/TR 21548:2010
|
Health informatics. Security requirements for archiving of electronic health records. Guidelines |
CSA ISO/IEC 18028-4 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING REMOTE ACCESS |
12/30271004 DC : 0
|
BS ISO 22600-2 - HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 2: FORMAL MODELS |
04/30091043 DC : DRAFT DEC 2004
|
ISO/IEC 19791 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSESSMENT OF OPERATIONAL SYSTEMS |
IEC PAS 62601:2009
|
Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile |
INCITS/ISO/IEC 24713-3 : 2010
|
INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 3: BIOMETRICS BASED VERIFICATION AND IDENTIFICATION OF SEAFARERS |
CSA ISO TS 17090-3 : 2005
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 3: POLICY MANAGEMENT OF CERTIFICATION AUTHORITY |
ISO/IEC TR 18044:2004
|
Information technology Security techniques Information security incident management |
TR 102 538 : 1.1.1
|
USER GROUP; LIST OF DEFINITIONS AND ABBREVIATIONS |
IEC 62443-2-1:2010
|
Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
INCITS/ISO/IEC 18028-5 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
ISO/TR 12859:2009
|
Intelligent transport systems System architecture Privacy aspects in ITS standards and systems |
TR 102 420 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
I.S. EN 62601:2016
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
ISO/TS 22600-2:2006
|
Health informatics Privilege management and access control Part 2: Formal models |
CSA ISO/IEC 18028-3 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 3: SECURING COMMUNICATIONS BETWEEN NETWORKS USING SECURITY GATEWAYS |
UNE-ISO 16363:2017
|
Space data and information transfer systems. Audit and certification of trustworthy digital repositories. |
DD ISO/TS 17090-2:2002
|
Health informatics. Public key infrastructure Certificate profile |
I.S. CWA 14172-3:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 3: TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES |
I.S. EN 13606-4:2007
|
HEALTH INFORMATICS - ELECTRONIC HEALTH RECORD COMMUNICATION - PART 4: SECURITY |
VDI 4003:2007-03
|
Reliability management |
TR 102 046 : 1.2.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); MAINTENANCE REPORT |
BS ISO/IEC 18028-4:2005
|
Information technology. Security techniques. IT network security Securing remote access |
04/30040790 DC : DRAFT MARCH 2004
|
ISO/IEC DTR 15443-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 2 - ASSURANCE METHODS |
PD ISO/TR 18492:2005
|
Long-term preservation of electronic document-based information |
BS ISO/IEC 23988:2007
|
Information technology. A code of practice for the use of information technology (IT) in the delivery of assessments |
10/30234446 DC : 0
|
BS ISO 16363 - SPACE DATA AND INFORMATION TRANSFER SYSTEMS - AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES |
DIN EN 62601:2016-10
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016 |
BS ISO/IEC 18028-1:2006
|
Information technology. Security techniques. IT network security Network security management |
DD ISO/TS 17090-3:2002
|
Health informatics. Public key infrastructure Policy management of certification authority |
04/30115788 DC : DRAFT JUN 2004
|
ISO/IEC PAS 20886 - INFORMATION TECHNOLOGY - INTERNATIONAL SECURITY, TRUST, AND PRIVACY ALLIANCE - PRIVACY FRAMEWORK |
01/682010 DC : DRAFT JAN 2002
|
BS 7799-2 INFORMATION SECURITY MANAGEMENT - PART 2: SPECIFICATION FOR INFORMATION SECURITY MANAGEMENT SYSTEMS |
03/652707 DC : DRAFT DEC 2003
|
ISO/IEC 18044 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
BS IEC 62443-2-1 : 2010
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
DD ISO/TS 17090-1:2002
|
Health informatics. Public key infrastructure Framework and overview |
BS ISO/IEC 18028-3:2005
|
Information technology. Security techniques. IT network security Securing communications between networks using security gateways |
INCITS/ISO 19153 : 2014
|
GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
04/30126470 DC : DRAFT DEC 2004
|
ISO/IEC 24743 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS REQUIREMENTS SPECIFICATION |
TR 102 041 : 1.1.1
|
SIGNATURE POLICIES REPORT |
ISO/IEC 23988:2007
|
Information technology — A code of practice for the use of information technology (IT) in the delivery of assessments |
TS 102 165-2 : 4.2.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
ISA 99.02.01 : 2009
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
BS ISO/IEC 21827:2008
|
Information technology. Security techniques. Systems security engineering. Capability maturity model (SSE- CMM) |
I.S. CEN TS 15260:2006
|
HEALTH INFORMATICS - CLASSIFICATION OF SAFETY RISKS FROM HEALTH INFORMATICS PRODUCTS |
06/30144361 DC : 0
|
ISO 27799 - HEALTH INFORMATICS - SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 17799 |
CSA ISO 10014 : 2006 : INC : COR 1 : 2016 : R201100
|
QUALITY MANAGEMENT - GUIDELINES FOR REALIZING FINANCIAL AND ECONOMIC BENEFITS |
CSA ISO/IEC 21827 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SYSTEMS SECURITY ENGINEERING - CAPABILITY MATURITY MODEL (SSE-CMM) |
ISO/TS 17090-3:2002
|
Health informatics Public key infrastructure Part 3: Policy management of certification authority |
CSA ISO/IEC TR 18044 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
IEC TR 62351-10:2012
|
Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
ANSI X9.99 : 2009
|
FINANCIAL SERVICES - PRIVACY IMPACT ASSESSMENT |
CSA ISO TS 17090-1 : 2005
|
HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 1: FRAMEWORK AND OVERVIEW |
ISO/IEC 33071:2016
|
Information technology Process assessment An integrated process capability assessment model for Enterprise processes |
CSA ISO/IEC 18028-5 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
TR 102 572 : 1.1.1
|
BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
ISO/IEC 18028-3:2005
|
Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
AIIM ARP1 : 2009
|
ANALYSIS, SELECTION, AND IMPLEMENTATION OF ELECTRONIC DOCUMENT MANAGEMENT SYSTEMS (EDMS) |
ISO/IEC 21827:2008
|
Information technology Security techniques Systems Security Engineering Capability Maturity Model (SSE-CMM) |
ISO/TS 21547:2010
|
Health informatics Security requirements for archiving of electronic health records Principles |
ISO/TS 22220:2011
|
Health informatics — Identification of subjects of health care |
ISO/TR 22957:2009
|
Document management Analysis, selection and implementation of electronic document management systems (EDMS) |
ISO 19092:2008
|
Financial services — Biometrics — Security framework |
ISO/TS 17090-1:2002
|
Health informatics Public key infrastructure Part 1: Framework and overview |
ISO/IEC 18028-5:2006
|
Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks |
ISO/TR 13569:2005
|
Financial services Information security guidelines |
BS EN 13606-4:2007
|
Health informatics. Electronic health record communication Security |
BS 7799-2(2005) : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS |
NASA CCSDS 652.0-M : ISSUE 1
|
AUDIT AND CERTIFICATION OF TRUSTWORTHY DIGITAL REPOSITORIES |
03/652496 DC : DRAFT JUNE 2003
|
ISO/IEC TR 15443-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 1: OVERVIEW AND FRAMEWORK |
ISO/TR 21548:2010
|
Health informatics Security requirements for archiving of electronic health records Guidelines |
BS IEC 62601:2011
|
Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile |
ISO/TS 25238:2007
|
Health informatics Classification of safety risks from health software |
BIS IS/ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
05/30092187 DC : DRAFT APR 2005
|
ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
ISO/TR 27809:2007
|
Health informatics Measures for ensuring patient safety of health software |
ISO/IEC 18043:2006
|
Information technology Security techniques Selection, deployment and operations of intrusion detection systems |
BS EN 62601:2016
|
Industrial networks. Wireless communication network and communication profiles. WIA-PA |
ISO/TR 21089:2004
|
Health informatics Trusted end-to-end information flows |
BS ISO 10005:2005
|
Quality management systems. Guidelines for quality plans |
07/30168214 DC : 0
|
BS ISO/IEC 25012 - SOFTWARE ENGINEERING - SOFTWARE PRODUCT QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - DATA QUALITY MODEL |
CSA ISO 10005 : 2005
|
QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
DD CEN/TS 15260:2006
|
Health informatics. Classification of safety risks from health informatics products |
TS 187 016 : 3.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
INCITS/ISO/IEC 18028-1 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
ISO 19092-1:2006
|
Financial services Biometrics Part 1: Security framework |
DD ISO/TS 22220:2011
|
Health informatics. Identification of subjects of health care |
CEI EN 60255-1 : 2011
|
MEASURING RELAYS AND PROTECTION EQUIPMENT - PART 1: COMMON REQUIREMENTS |
UNI CEI ISO/IEC 20000-2 : 2010
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: CODE OF PRACTICE |
ISO/TR 18492:2005
|
Long-term preservation of electronic document-based information |
I.S. CWA 14172-6:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 6: SIGNATURE-CREATION DEVICE SUPPORTING SIGNATURES OTHER THAN QUALIFIED |
ISO/IEC 18028-1:2006
|
Information technology Security techniques IT network security Part 1: Network security management |
I.S. CWA 14172-1:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 1: GENERAL INTRODUCTION |
I.S. CWA 14172-8:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 8: TIME-STAMPING AUTHORITY SERVICES AND PROCESSES |
IEC 62601:2015
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA |
IEC 60255-1:1967
|
Electrical relays - Part 1: Instantaneous all-or-nothing relays |
UNE-EN 60255-1:2010
|
Measuring relays and protection equipment -- Part 1: Common requirements |
EN 13606-4:2007
|
Health informatics - Electronic health record communication - Part 4: Security |
05/30104603 DC : DRAFT JUN 2005
|
ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
13/30274150 DC : 0
|
BS ISO 17090-2 - HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 2: CERTIFICATE PROFILE |
08/30193508 DC : DRAFT NOV 2008
|
BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
PD ISO/TR 13569:2005
|
Financial services. Information security guidelines |
ISO/IEC 18028-4:2005
|
Information technology Security techniques IT network security Part 4: Securing remote access |
CEI UNI ISO/IEC 20000-2 : 2011
|
INFORMATION TECHNOLOGY - SERVICE MANAGEMENT - PART 2: CODE OF PRACTICE |
ISO 19153:2014
|
Geospatial Digital Rights Management Reference Model (GeoDRM RM) |
BS ISO 10014:2006
|
Quality management. Guidelines for realizing financial and economic benefits |
BS ISO/IEC 24713-3:2009
|
Information technology. Biometric profiles for interoperability and data interchange Biometrics-based verification and identification of seafarers |
DD ISO/TS 22600-2:2006
|
Health informatics. Privilege management and access control Formal models |
04/30092984 DC : DRAFT JAN 2004
|
ISO 10005 - QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
05/30116896 DC : DRAFT SEP 2005
|
ISO 19092-1 - FINANCIAL SERVICES - BIOMETRICS - PART 1: SECURITY FRAMEWORK |
CSA ISO 10005 : 2005 : R2010
|
QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
CSA ISO 10005 : 2005 : R2015
|
QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
INCITS/ISO/IEC TR 18044 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY INCIDENT MANAGEMENT |
CSA ISO/IEC 21827 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SYSTEMS SECURITY ENGINEERING - CAPABILITY MATURITY MODEL (SSE-CMM) |
INCITS/ISO/IEC 18028-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 4: SECURING REMOTE ACCESS |
EG 202 487 : 1.1.2
|
HUMAN FACTORS (HF); USER EXPERIENCE GUIDELINES; TELECARE SERVICES (EHEALTH) |
CSA ISO 10005 : 2005 : R2010 : FR
|
QUALITY MANAGEMENT SYSTEMS - GUIDELINES FOR QUALITY PLANS |
ISO 10005:2005
|
Quality management systems Guidelines for quality plans |
I.S. EN CWA 14172-5:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 5: SECURE SIGNATURE CREATION DEVICES |
ISO/IEC 24713-3:2009
|
Information technology Biometric profiles for interoperability and data interchange Part 3: Biometrics-based verification and identification of seafarers |
CSA ISO/IEC 18028-1 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
I.S. EN 60255-1:2010
|
MEASURING RELAYS AND PROTECTION EQUIPMENT - PART 1: COMMON REQUIREMENTS |
ISO/TS 13131:2014
|
Health informatics Telehealth services Quality planning guidelines |
ISO/TS 17090-2:2002
|
Health informatics Public key infrastructure Part 2: Certificate profile |
ISO 16363:2012
|
Space data and information transfer systems — Audit and certification of trustworthy digital repositories |
EN 60255-1:2010
|
Measuring relays and protection equipment - Part 1: Common requirements |