ISO/IEC 15946-1:2016Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
155.00 €
|
ISO/IEC 18370-2:2016Information technology - Security techniques - Blind digital signatures - Part 2: Discrete logarithm based mechanisms
199.00 €
|
ISO/IEC 27033-6:2016Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access
132.00 €
|
ISO/IEC 29192-4:2013/AMD1:2016Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques - Amendment 1
18.00 €
|
ISO/IEC TR 20004:2015Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
98.00 €
|
ISO/IEC 27017:2015Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
155.00 €
|
ISO/IEC 18033-5:2015Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers
177.00 €
|
ISO/IEC 27010:2015Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
155.00 €
|
ISO/IEC 14888-2:2008/COR1:2015Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms - Technical Corrigendum 1: To ISO/IEC 14888-2:2008
0.00 €
|
ISO/IEC 27033-1:2015Information technology - Security techniques - Network security - Part 1: Overview and concepts
177.00 €
|
ISO/IEC 29190:2015Information technology - Security techniques - Privacy capability assessment model
98.00 €
|
ISO/IEC 27034-2:2015Information technology - Security techniques - Application security - Part 2: Organization normative framework
199.00 €
|
ISO/IEC 27041:2015Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method
98.00 €
|
ISO/IEC 27042:2015Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence
98.00 €
|
ISO/IEC 24760-2:2015Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements
177.00 €
|
ISO/IEC TS 30104:2015Information Technology - Security Techniques - Physical Security Attacks, Mitigation Techniques and Security Requirements
155.00 €
|
ISO/IEC 18014-4:2015Information technology - Security techniques - Time-stamping services - Part 4: Traceability of time sources
98.00 €
|
ISO/IEC 27043:2015Information technology - Security techniques - Incident investigation principles and processes
155.00 €
|
ISO/IEC 27039:2015Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS)
177.00 €
|
ISO/IEC 10118-4:1998/AMD1:2014Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic - Amendment 1: Object identifiers
18.00 €
|