ISO/IEC 29190:2015Information technology - Security techniques - Privacy capability assessment model
96,00 €
|
ISO/IEC 27034-2:2015Information technology - Security techniques - Application security - Part 2: Organization normative framework
194,00 €
|
ISO/IEC 27041:2015Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method
96,00 €
|
ISO/IEC 27042:2015Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence
96,00 €
|
ISO/IEC 24760-2:2015Information technology -- Security techniques -- A framework for identity management -- Part 2: Reference architecture and requirements
173,00 €
|
ISO/IEC TS 30104:2015Information Technology -- Security Techniques -- Physical Security Attacks, Mitigation Techniques and Security Requirements
151,00 €
|
ISO/IEC 18014-4:2015Information technology -- Security techniques -- Time-stamping services -- Part 4: Traceability of time sources
96,00 €
|
ISO/IEC 27043:2015Information technology - Security techniques - Incident investigation principles and processes
151,00 €
|
ISO/IEC 27039:2015Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection systems (IDPS)
173,00 €
|
ISO/IEC 10118-4:1998/AMD1:2014Amendment 1 - Information technology -- Security techniques -- Hash-functions -- Part 4: Hash-functions using modular arithmetic - Object identifiers
18,00 €
|
ISO/IEC 18031:2011/COR1:2014Corrigendum 1 - Information technology -- Security techniques -- Random bit generation
0,00 €
|
ISO/IEC 10118-4:1998/COR1:2014Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 4: Hash-functions using modular arithmetic
0,00 €
|
ISO/IEC 27038:2014Information technology -- Security techniques -- Specification for digital redaction
63,00 €
|
ISO/IEC 29150:2011/COR1:2014Corrigendum 1 - Information technology -- Security techniques -- Signcryption
0,00 €
|
ISO/IEC 27033-4:2014Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security gateways
129,00 €
|
ISO/IEC 27034-1:2011/COR1:2014Corrigendum 1 - Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts
0,00 €
|
ISO/IEC 20008-1:2013Information technology -- Security techniques -- Anonymous digital signatures -- Part 1: General
129,00 €
|
ISO/IEC 20009-2:2013Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key
194,00 €
|
ISO/IEC 20008-2:2013Information technology -- Security techniques -- Anonymous digital signatures -- Part 2: Mechanisms using a group public key
216,00 €
|
ISO/IEC 20009-1:2013Information technology -- Security techniques -- Anonymous entity authentication -- Part 1: General
42,00 €
|