ISO/IEC 19592-1:2016Information technology - Security techniques - Secret sharing - Part 1: General
63,00 €
|
ISO/IEC 10118-1:2016Information technology - Security techniques - Hash-functions - Part 1: General
63,00 €
|
ISO/IEC 11770-6:2016Information technology - Security techniques - Key management - Part 6: Key derivation
129,00 €
|
ISO/IEC 27034-6:2016Information technology - Security techniques - Application security - Part 6: Case studies
194,00 €
|
ISO/IEC 27036-4:2016Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services
129,00 €
|
ISO/IEC 24760-3:2016Information technology - Security techniques - A framework for identity management - Part 3: Practice
151,00 €
|
ISO/IEC 29192-5:2016Information technology - Security techniques - Lightweight cryptography - Part 5: Hash-functions
129,00 €
|
ISO/IEC 15946-1:2016Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
151,00 €
|
ISO/IEC 18370-2:2016Information technology - Security techniques - Blind digital signatures - Part 2: Discrete logarithm based mechanisms
194,00 €
|
ISO/IEC 27033-6:2016Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access
129,00 €
|
|
ISO/IEC 29192-4:2013/AMD1:2016Amendment 1 - Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques
18,00 €
|
ISO/IEC 11889-2:2015Information technology - Trusted Platform Module Library - Part 2: Structures
216,00 €
|
ISO/IEC 11889-3:2015Information technology - Trusted Platform Module Library - Part 3: Commands
216,00 €
|
ISO/IEC 11889-4:2015Information technology - Trusted Platform Module Library - Part 4: Supporting Routines
216,00 €
|
ISO/IEC 11889-1:2015Information technology - Trusted Platform Module Library - Part 1: Architecture
216,00 €
|
ISO/IEC TR 20004:2015Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
96,00 €
|
ISO/IEC 18033-5:2015Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers
173,00 €
|
ISO/IEC 14888-2:2008/COR1:2015Corrigendum 1 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
0,00 €
|
ISO/IEC 27033-1:2015Information technology - Security techniques - Network security - Part 1: Overview and concepts
173,00 €
|