ISO/IEC TS 27110:2021Information technology, cybersecurity and privacy protection - Cybersecurity framework development guidelines
129.00 €
|
ISO/IEC 11770-4:2017/AMD2:2021Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secrets
63.00 €
|
|
|
ISO/IEC 27014:2020Information security, cybersecurity and privacy protection - Governance of information security
96.00 €
|
ISO/IEC 20897-1:2020Information security, cybersecurity and privacy protection - Physically unclonable functions - Part 1: Security requirements
96.00 €
|
|
|
|
ISO/IEC 19989-2:2020Information security - Criteria and methodology for security evaluation of biometric systems - Part 2: Biometric recognition performance
151.00 €
|
ISO/IEC 19989-1:2020Information security - Criteria and methodology for security evaluation of biometric systems - Part 1: Framework
194.00 €
|
ISO/IEC 20547-4:2020Information technology - Big data reference architecture - Part 4: Security and privacy
194.00 €
|
ISO/IEC 19989-3:2020Information security - Criteria and methodology for security evaluation of biometric systems - Part 3: Presentation attack detection
96.00 €
|
ISO/IEC 27035-3:2020Information technology - Information security incident management - Part 3: Guidelines for ICT incident response operations
151.00 €
|
|
ISO/IEC 13888-3:2020Information security - Non-repudiation - Part 3: Mechanisms using asymmetric techniques
96.00 €
|
ISO/IEC 18033-4:2011/AMD1:2020Amendment 1 - Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers - ZUC
18.00 €
|
|
ISO/IEC 20085-2:2020IT Security techniques - Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules - Part 2: Test calibration methods and apparatus
96.00 €
|
ISO/IEC 9797-3:2011/AMD1:2020Amendment 1 - Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
18.00 €
|