ATIS T1.413 : 98 SUPP A 2001
|
NETWORK TO CUSTOMER INSTALLATION INTERFACES - ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL) METALLIC INTERFACE |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 7498-1:1994
|
Information technology Open Systems Interconnection Basic Reference Model: The Basic Model |
ISO/IEC 27003:2017
|
Information technology — Security techniques — Information security management systems — Guidance |
ISO/IEC 27004:2016
|
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
ISO 16739:2013
|
Industry Foundation Classes (IFC) for data sharing in the construction and facility management industries |
IEEE 802.15.4-2011
|
IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
ISO/IEC 29145-2:2014
|
Information Technology - Wireless Beacon-enabled Energy Efficient Mesh network (WiBEEM) for wireless home network services Part 2: MAC Layer |
ISO/IEC 27006:2015
|
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
IEEE 802.11-2016
|
IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 15944-8:2012
|
Information technology — Business operational view — Part 8: Identification of privacy protection requirements as external constraints on business transactions |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
ISO/IEC 14543-2-1:2006
|
Information technology - Home electronic systems (HES) architecture Part 2-1: Introduction and device modularity |
ISO/IEC 27010:2015
|
Information technology Security techniques Information security management for inter-sector and inter-organizational communications |
ISO/IEC 27011:2016
|
Information technology Security techniques Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
ISO/IEC 18012-1:2004
|
Information technology Home Electronic System Guidelines for product interoperability Part 1: Introduction |
ISO/IEC 27005:2011
|
Information technology Security techniques Information security risk management |
IEEE 802.16-2012
|
IEEE Standard for Air Interface for Broadband Wireless Access Systems |
ISO/IEC TR 27008:2011
|
Information technology Security techniques Guidelines for auditors on information security controls |
ISO/IEC 27007:2017
|
Information technology Security techniques Guidelines for information security management systems auditing |
IEEE 1901-2010
|
IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications |
ISO/IEC 30100-1:2016
|
Information technology Home network resource management Part 1: Requirements |
ISO/IEC/IEEE 8802-3:2017
|
Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 3: Standard for Ethernet |
ISO/IEC 27000:2016
|
Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 18012-2:2012
|
Information technology Home Electronic System Guidelines for product interoperability Part 2: Taxonomy and application interoperability model |
ISO/IEC 27009:2016
|
Information technology Security techniques Sector-specific application of ISO/IEC 27001 Requirements |