ISO/IEC 27050-2:2018Information technology - Electronic discovery - Part 2: Guidance for governance and management of electronic discovery
65.00 €
|
ISO/IEC 11770-2:2018IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
155.00 €
|
ISO/IEC 19823-19:2018Information technology - Conformance test methods for security service crypto suites - Part 19: Crypto suite RAMON
98.00 €
|
ISO/IEC 19896-2:2018IT security techniques - Competence requirements for information security testers and evaluators - Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
155.00 €
|
ISO/IEC 19896-3:2018IT security techniques - Competence requirements for information security testers and evaluators - Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators
155.00 €
|
ISO/IEC 21964-1:2018Information technology - Destruction of data carriers - Part 1: Principles and definitions
43.00 €
|
ISO/IEC 21964-2:2018Information technology - Destruction of data carriers - Part 2: Requirements for equipment for destruction of data carriers
65.00 €
|
ISO/IEC 21964-3:2018Information technology - Destruction of data carriers - Part 3: Process of destruction of data carriers
65.00 €
|
ISO/IEC 27034-3:2018Information technology - Application security - Part 3: Application security management process
177.00 €
|
ISO/IEC 27034-7:2018Information technology - Application security - Part 7: Assurance prediction framework
155.00 €
|
ISO/IEC TS 27034-5-1:2018Information technology - Application security - Part 5-1: Protocols and application security controls data structure, XML schemas
199.00 €
|
ISO/IEC 19823-13:2018Information technology - Conformance test methods for security service crypto suites - Part 13: Cryptographic Suite Grain-128A
132.00 €
|
|
ISO/IEC 19896-1:2018IT security techniques - Competence requirements for information security testers and evaluators - Part 1: Introduction, concepts and general requirements
65.00 €
|
ISO/IEC TR 27103:2018Information technology - Security techniques - Cybersecurity and ISO and IEC Standards
132.00 €
|
ISO/IEC 27000:2018Information technology - Security techniques - Information security management systems - Overview and vocabulary
0.00 €
|
ISO/IEC 11770-4:2017Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
177.00 €
|
ISO/IEC 18033-2:2006/AMD1:2017Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers - Amendment 1: FACE
18.00 €
|
ISO/IEC 27021:2017Information technology - Security techniques - Competence requirements for information security management systems professionals
132.00 €
|
ISO/IEC TS 19249:2017Information technology - Security techniques - Catalogue of architectural and design principles for secure products, systems and applications
132.00 €
|