ISO/IEC 27033-5:2013Information technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
96,00 €
|
ISO/IEC 18180:2013Information technology -- Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2
194,00 €
|
ISO/IEC 29192-4:2013Information technology -- Security techniques -- Lightweight cryptography -- Part 4: Mechanisms using asymmetric techniques
129,00 €
|
ISO/IEC 29115:2013Information technology -- Security techniques -- Entity authentication assurance framework
173,00 €
|
ISO/IEC 13888-2:2010/COR1:2012Corrigendum 1 - Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques -
0,00 €
|
ISO/IEC 29191:2012Information technology -- Security techniques -- Requirements for partially anonymous, partially unlinkable authentication.
63,00 €
|
ISO/IEC TR 15443-1:2012Information technology -- Security techniques -- Security assurance framework -- Part 1: Introduction and concepts
194,00 €
|
ISO/IEC TR 15443-2:2012Information technology -- Security techniques -- Security assurance framework -- Part 2: Analysis
96,00 €
|
ISO/IEC 27037:2012Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence
173,00 €
|
ISO/IEC 29192-3:2012Information technology -- Security techniques -- Lightweight cryptography -- Part 3: Stream ciphers
129,00 €
|
ISO/IEC 19790:2012Information technology -- Security techniques -- Security requirements for cryptographic modules
194,00 €
|
ISO/IEC 27033-2:2012Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network security
151,00 €
|
ISO/IEC 9798-4:1999/COR2:2012Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function -
0,00 €
|
ISO/IEC 29192-1:2012Information technology -- Security techniques -- Lightweight cryptography -- Part 1: General
96,00 €
|
ISO/IEC TR 29149:2012Information technology -- Security techniques -- Best practices for the provision and use of time-stamping services
129,00 €
|
ISO/IEC 18033-4:2011Information technology -- Security techniques -- Encryption algorithms -- Part 4: Stream ciphers
216,00 €
|
|
ISO/IEC 10118-2:2010/COR1:2011Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher -
0,00 €
|
ISO/IEC 27034-1:2011Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts
194,00 €
|
ISO/IEC 9797-3:2011Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 3: Mechanisms using a universal hash-function
129,00 €
|