ISO/IEC 27033-3:2010Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques and control issues
151.00 €
|
ISO/IEC 13888-2:2010Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques
96.00 €
|
ISO/IEC 11770-1:2010Information technology -- Security techniques -- Key management -- Part 1: Framework
151.00 €
|
ISO/IEC 9798-6:2010Information technology -- Security techniques -- Entity authentication -- Part 6: Mechanisms using manual data transfer
151.00 €
|
ISO/IEC 10118-2:2010Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher
151.00 €
|
ISO/IEC 9798-1:2010Information technology -- Security techniques -- Entity authentication -- Part 1: General
63.00 €
|
ISO/IEC TR 19791:2010Information technology -- Security techniques -- Security assessment of operational systems
216.00 €
|
ISO/IEC 18014-3:2009Information technology -- Security techniques -- Time-stamping services -- Part 3: Mechanisms producing linked tokens
173.00 €
|
ISO/IEC 9798-5:2009Information technology -- Security techniques -- Entity authentication -- Part 5: Mechanisms using zero-knowledge techniques
194.00 €
|
ISO/IEC 9798-4:1999/COR1:2009Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function -
0.00 €
|
ISO/IEC 19792:2009Information technology -- Security techniques -- Security evaluation of biometrics
173.00 €
|
ISO/IEC 21827:2008Information technology -- Security techniques -- Systems Security Engineering -- Capability Maturity Model® (SSE-CMM®)
216.00 €
|
ISO/IEC 18014-1:2008Information technology -- Security techniques -- Time-stamping services -- Part 1: Framework
151.00 €
|
ISO/IEC 14888-2:2008Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
194.00 €
|
ISO/IEC 14888-1:2008Information technology - Security techniques - Digital signatures with appendix - Part 1: General
63.00 €
|
ISO/IEC 9796-3:2006Information technology -- Security techniques -- Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
194.00 €
|
ISO/IEC 18033-2:2006Information technology -- Security techniques -- Encryption algorithms -- Part 2: Asymmetric ciphers
216.00 €
|
|
ISO/IEC TR 14516:2002Information technology -- Security techniques -- Guidelines for the use and management of Trusted Third Party services
151.00 €
|
ISO/IEC 15945:2002Information technology -- Security techniques -- Specification of TTP services to support the application of digital signatures
194.00 €
|