BS ISO/IEC 19896-1:2018
|
IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements
|
I.S. EN ISO/IEC 27040:2016
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
|
14/30249803 DC : 0
|
BS ISO/IEC 27040 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
|
14/30259616 DC : 0
|
BS ISO/IEC 17825 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUE - TESTING METHODS FOR THE MTIGATION OF NON-INVASIVE ATTACK CLASSES AGAINST CRYPTOGRAPHIC MODULES
|
PD ISO/TS 12812-2:2017
|
Core banking. Mobile financial services Security and data protection for mobile financial services
|
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
|
ISO/IEC TS 20540:2018
|
Information technology — Security techniques — Testing cryptographic modules in their operational environment
|
ISO/TS 12812-2:2017
|
Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
|
DIN EN ISO/IEC 27040:2016-04 (Draft)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
|
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
|
PD ISO/IEC TS 30104:2015
|
Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
|
17/30354862 DC : 0
|
BS ISO/IEC 19896-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 2: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 19790 TESTERS
|
ISO/IEC 20248:2018
|
Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure
|
UNI/TS 11291-10 : 2013
|
GAS MEASUREMENT SYSTEMS - HOURLY BASED GAS METERING SYSTEMS - PART 10: SAFETY
|
15/30279582 DC : 0
|
BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
|
ISO/IEC TS 30104:2015
|
Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements
|
DIN EN ISO/IEC 27040 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015)
|
BS ISO/IEC 27040 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
|
BS EN ISO/IEC 27040:2016
|
Information technology. Security techniques. Storage security
|
ISO/IEC 27040:2015
|
Information technology — Security techniques — Storage security
|
EN ISO/IEC 27040:2016
|
Information technology - Security techniques - Storage security (ISO/IEC 27040:2015)
|
18/30356051 DC : DRAFT APR 2018
|
BS ISO/IEC 20543 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST AND ANALYSIS METHODS FOR RANDOM BIT GENERATORS WITHIN ISO/IEC 19790 AND ISO/IEC 15408
|
BS ISO/IEC 17825:2016
|
Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
|
17/30351732 DC : 0
|
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS
|
INCITS/ISO/IEC 27040 : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY
|
ISO/IEC 19896-1:2018
|
IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements
|
ISO/IEC 17825:2016
|
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
|
CAN/CSA-ISO/IEC 17825:18
|
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules (Adopted ISO/IEC 17825:2016, first edition, 2016-01-15)
|
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)
|