Electrotechincal
Electrotechincal
KS ISO/IEC29150:2011
Information technology Security techniques Signcryption
specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs..
Kes 4,820.00
KS ISO/IEC18031:2011
Information technology Security techniques Random bit generation
specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model...
Kes 12,179.00
KS ISO/IECTR 15443-1
Information technology Security techniques - Security assurance framework - Part 1: Introduction and concepts
Defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles..
Kes 4,696.00
KSISO/IECTR 20000-4
Information technology Service management part 4: Process reference model
defines a process reference model comprising a set of processes, described in terms of process purpose and outcomes that demonstrate coverage of the requirements of ISO/IEC 20000-1...
Kes 3,437.00
KSISO/IEC19770-1:
Information technology Software asset management Part 1: Processes and tiered assessment of conformance.
Establishes a baseline for an integrated set of processes for Software Asset Management (SAM), divided into tiers to allow for incremental implementation, assessment and recognition...
Kes 7,416.00
KSISO/IEC19770-2:
Information technology Software asset management Part 2: Software identification tag.
Establishes specifications for tagging software to optimize its identification and management...
Kes 8,072.00
KSISOIECIEEE 8802-3
Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 3: Standard for Ethernet
Defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information base (MIB)...
Kes 0.00
KSISO/IEC TS 27100:2020
Information technology - Cybersecurity - Overview and concepts
Describes cybersecurity and relevant concepts, including how it is related to and different from information security..
Kes 3,308.00
KSISOIEC/TS27034-5-1
Information technology - Application security Part 5-1: Protocols and application security controls data structure, XML schemas
Defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from ISO/IEC 27034-5..
Kes 7,261.00