ISO/IEC 19592-1:2016Information technology - Security techniques - Secret sharing - Part 1: General
63.00 €
|
ISO/IEC 10118-1:2016Information technology - Security techniques - Hash-functions - Part 1: General
63.00 €
|
ISO/IEC 11770-6:2016Information technology - Security techniques - Key management - Part 6: Key derivation
129.00 €
|
ISO/IEC 27034-6:2016Information technology - Security techniques - Application security - Part 6: Case studies
194.00 €
|
ISO/IEC 27036-4:2016Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services
129.00 €
|
ISO/IEC 24760-3:2016Information technology - Security techniques - A framework for identity management - Part 3: Practice
151.00 €
|
ISO/IEC 29192-5:2016Information technology - Security techniques - Lightweight cryptography - Part 5: Hash-functions
129.00 €
|
ISO/IEC 15946-1:2016Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
151.00 €
|
ISO/IEC 18370-2:2016Information technology - Security techniques - Blind digital signatures - Part 2: Discrete logarithm based mechanisms
194.00 €
|
ISO/IEC 27033-6:2016Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access
129.00 €
|
|
ISO/IEC 29192-4:2013/AMD1:2016Amendment 1 - Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques
18.00 €
|
ISO/IEC 11889-2:2015Information technology - Trusted Platform Module Library - Part 2: Structures
216.00 €
|
ISO/IEC 11889-3:2015Information technology - Trusted Platform Module Library - Part 3: Commands
216.00 €
|
ISO/IEC 11889-4:2015Information technology - Trusted Platform Module Library - Part 4: Supporting Routines
216.00 €
|
ISO/IEC 11889-1:2015Information technology - Trusted Platform Module Library - Part 1: Architecture
216.00 €
|
ISO/IEC TR 20004:2015Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
96.00 €
|
ISO/IEC 18033-5:2015Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers
173.00 €
|
ISO/IEC 14888-2:2008/COR1:2015Corrigendum 1 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
0.00 €
|
ISO/IEC 27033-1:2015Information technology - Security techniques - Network security - Part 1: Overview and concepts
173.00 €
|