• Showing  21 to  30 of  879 

    Filters:

    Category

    • IT Security
    Product Logo   

    ISO/IEC 14888-3 : 2018

    IT Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms

    International Organization for Standardization

    Product Logo   

    ISO/IEC 21878:2018

    Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers

    International Organization for Standardization

    Product Logo   

    ISO/IEC 20889 : 2018

    Privacy enhancing data de-identification terminology and classification of techniques

    International Organization for Standardization

    Product Logo   

    ISO/IEC 29147:2018

    Information technology — Security techniques — Vulnerability disclosure

    International Organization for Standardization

    Product Logo   

    ISO/IEC TS 19608:2018

    Guidance for developing security and privacy functional requirements based on ISO/IEC 15408

    International Organization for Standardization

    Product Logo   

    ISO/IEC 21964-3:2018

    Information technology -- Destruction of data carriers -- Part 3: Process of destruction of data carriers

    International Organization for Standardization

    Product Logo   

    ISO/IEC 19896-2:2018

    IT security techniques -- Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers

    International Organization for Standardization

    Product Logo   

    ISO/IEC 27050-2:2018

    Information technology -- Electronic discovery -- Part 2: Guidance for governance and management of electronic discovery

    International Organization for Standardization

    Product Logo   

    ISO/IEC FDIS 27018:2018

    Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

    International Organization for Standardization

    Product Logo   

    ISO/IEC 11770-2:2018

    IT Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques

    International Organization for Standardization

    < 1 2 3 4 5 6 7 8 9 10 >