ISO/IEC TR 15443-2:2012Information technology -- Security techniques -- Security assurance framework -- Part 2: Analysis
96,00 €
|
ISO/IEC 27037:2012Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence
173,00 €
|
ISO/IEC 29192-3:2012Information technology -- Security techniques -- Lightweight cryptography -- Part 3: Stream ciphers
129,00 €
|
ISO/IEC 19790:2012Information technology -- Security techniques -- Security requirements for cryptographic modules
194,00 €
|
ISO/IEC 27033-2:2012Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network security
151,00 €
|
ISO/IEC 9798-4:1999/COR2:2012Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function -
0,00 €
|
ISO/IEC 29192-1:2012Information technology -- Security techniques -- Lightweight cryptography -- Part 1: General
96,00 €
|
ISO/IEC TR 29149:2012Information technology -- Security techniques -- Best practices for the provision and use of time-stamping services
129,00 €
|
ISO/IEC 18033-4:2011Information technology -- Security techniques -- Encryption algorithms -- Part 4: Stream ciphers
216,00 €
|
|
ISO/IEC 10118-2:2010/COR1:2011Corrigendum 1 - Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher -
0,00 €
|
ISO/IEC 27034-1:2011Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts
194,00 €
|
ISO/IEC 9797-3:2011Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 3: Mechanisms using a universal hash-function
129,00 €
|
|
ISO/IEC 27031:2011Information technology -- Security techniques -- Guidelines for information and communication technology readiness for business continuity
173,00 €
|
ISO/IEC 9797-1:2011Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher
173,00 €
|
ISO/IEC 9796-2:2010Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
194,00 €
|
ISO/IEC 18033-3:2010Information technology -- Security techniques -- Encryption algorithms -- Part 3: Block ciphers
194,00 €
|
ISO/IEC 27033-3:2010Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques and control issues
151,00 €
|
ISO/IEC 13888-2:2010Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques
96,00 €
|