ISO/IEC 18033-6:2019IT Security techniques - Encryption algorithms - Part 6: Homomorphic encryption
96,00 €
|
ISO/IEC 9798-3:2019IT Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
129,00 €
|
ISO/IEC 27018:2019Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
129,00 €
|
ISO/IEC 29101:2018Information technology - Security techniques - Privacy architecture framework
173,00 €
|
ISO/IEC 14888-3:2018IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
216,00 €
|
ISO/IEC 21878:2018Information technology - Security techniques - Security guidelines for design and implementation of virtualized servers
129,00 €
|
ISO/IEC 20889:2018Privacy enhancing data de-identification terminology and classification of techniques
173,00 €
|
ISO/IEC 10118-3:2018IT Security techniques - Hash-functions - Part 3: Dedicated hash-functions
216,00 €
|
|
ISO/IEC TS 19608:2018Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
173,00 €
|
ISO/IEC 27050-2:2018Information technology - Electronic discovery - Part 2: Guidance for governance and management of electronic discovery
63,00 €
|
ISO/IEC 11770-2:2018IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
151,00 €
|
ISO/IEC 19823-19:2018Information technology - Conformance test methods for security service crypto suites - Part 19: Crypto suite RAMON
96,00 €
|
ISO/IEC 19896-2:2018IT security techniques - Competence requirements for information security testers and evaluators - Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
151,00 €
|
ISO/IEC 19896-3:2018IT security techniques - Competence requirements for information security testers and evaluators - Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators
151,00 €
|
ISO/IEC 21964-1:2018Information technology - Destruction of data carriers - Part 1: Principles and definitions
42,00 €
|
ISO/IEC 21964-2:2018Information technology - Destruction of data carriers - Part 2: Requirements for equipment for destruction of data carriers
63,00 €
|
ISO/IEC 21964-3:2018Information technology - Destruction of data carriers - Part 3: Process of destruction of data carriers
63,00 €
|
ISO/IEC 27034-3:2018Information technology - Application security - Part 3: Application security management process
173,00 €
|
ISO/IEC 27034-7:2018Information technology - Application security - Part 7: Assurance prediction framework
151,00 €
|