Electrotechincal

Electrotechincal



KS ISO/IEC 30105-8:2022

Information technology IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes Part 8: Continual performance improvement (CPI) of ITES-BPO

Specifies a continual performance improvement (CPI) methodology and its major elements, which extend the already-defined continual improvement process (TEN8) in ISO/IEC 30105-1...

Kes 3,605.00

KS 2416-3: 2014

Information technology learning, education and training- part 3: Network components to support eLearning

specifies the minimum network requirements to support in the effective use of IT for Learning, Education and Training (IT LET)...

Kes 3,167.00

KS ISO/IEC19772:2020

Information technology Security techniques Authenticated encryption

specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: o data confidentiality, i.e. protection against unauthorized disclosure of data,..

Kes 3,605.00

KS ISO/IEC18032:2020

Information technology Security techniques Prime number generation

specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms..

Kes 3,167.00

KS ISO/IEC29100:2011

Information technology Security techniques Privacy framework

provides a privacy framework which - specifies a common privacy terminology; - defines the actors and their roles in processing personally identifiable information (PII); - describes privacy safeguarding considerations; and - provides references ..

Kes 3,437.00

KS ISO/IEC29150:2011

Information technology Security techniques Signcryption

specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs..

Kes 4,820.00

KS ISO/IEC18031:2011

Information technology Security techniques Random bit generation

specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model...

Kes 12,179.00

KS ISO/IECTR 15443-1

Information technology Security techniques - Security assurance framework - Part 1: Introduction and concepts

Defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles..

Kes 4,696.00

KSISO/IECTR 20000-4

Information technology Service management part 4: Process reference model

defines a process reference model comprising a set of processes, described in terms of process purpose and outcomes that demonstrate coverage of the requirements of ISO/IEC 20000-1...

Kes 3,437.00

Showing 811 to 820 of 918 (92 Pages)