ISO/IEC 27034-6:2016Information technology - Security techniques - Application security - Part 6: Case studies
194,00 €
|
ISO/IEC 27036-4:2016Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services
129,00 €
|
ISO/IEC 24760-3:2016Information technology - Security techniques - A framework for identity management - Part 3: Practice
151,00 €
|
ISO/IEC 29192-5:2016Information technology - Security techniques - Lightweight cryptography - Part 5: Hash-functions
129,00 €
|
ISO/IEC 15946-1:2016Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
151,00 €
|
ISO/IEC 18370-2:2016Information technology - Security techniques - Blind digital signatures - Part 2: Discrete logarithm based mechanisms
194,00 €
|
ISO/IEC 27033-6:2016Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access
129,00 €
|
ISO/IEC 29192-4:2013/AMD1:2016Amendment 1 - Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques
18,00 €
|
ISO/IEC TR 20004:2015Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
96,00 €
|
ISO/IEC 27017:2015Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
151,00 €
|
ISO/IEC 18033-5:2015Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers
173,00 €
|
ISO/IEC 27010:2015Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
151,00 €
|
ISO/IEC 14888-2:2008/COR1:2015Corrigendum 1 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
0,00 €
|
ISO/IEC 27033-1:2015Information technology - Security techniques - Network security - Part 1: Overview and concepts
173,00 €
|
ISO/IEC 29190:2015Information technology - Security techniques - Privacy capability assessment model
96,00 €
|
ISO/IEC 27034-2:2015Information technology - Security techniques - Application security - Part 2: Organization normative framework
194,00 €
|
ISO/IEC 27041:2015Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method
96,00 €
|
ISO/IEC 27042:2015Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence
96,00 €
|
ISO/IEC 24760-2:2015Information technology -- Security techniques -- A framework for identity management -- Part 2: Reference architecture and requirements
173,00 €
|
ISO/IEC TS 30104:2015Information Technology -- Security Techniques -- Physical Security Attacks, Mitigation Techniques and Security Requirements
151,00 €
|