Electrotechincal

Electrotechincal



KS ISO/IEC29150:2011

Information technology Security techniques Signcryption

specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs..

Kes 4,820.00

KS ISO/IEC18031:2011

Information technology Security techniques Random bit generation

specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model...

Kes 12,179.00

KS ISO/IECTR 15443-1

Information technology Security techniques - Security assurance framework - Part 1: Introduction and concepts

Defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles..

Kes 4,696.00

KSISO/IECTR 20000-4

Information technology Service management part 4: Process reference model

defines a process reference model comprising a set of processes, described in terms of process purpose and outcomes that demonstrate coverage of the requirements of ISO/IEC 20000-1...

Kes 3,437.00

KSISO/IEC19770-1:

Information technology Software asset management Part 1: Processes and tiered assessment of conformance.

Establishes a baseline for an integrated set of processes for Software Asset Management (SAM), divided into tiers to allow for incremental implementation, assessment and recognition...

Kes 7,416.00

KSISO/IEC19770-2:

Information technology Software asset management Part 2: Software identification tag.

Establishes specifications for tagging software to optimize its identification and management...

Kes 8,072.00

KSISOIECIEEE 8802-3

Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 3: Standard for Ethernet

Defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information base (MIB)...

Kes 0.00

KSISO/IEC TS 27100:2020

Information technology - Cybersecurity - Overview and concepts

Describes cybersecurity and relevant concepts, including how it is related to and different from information security..

Kes 3,308.00

KSISOIEC/TS27034-5-1

Information technology - Application security Part 5-1: Protocols and application security controls data structure, XML schemas

Defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from ISO/IEC 27034-5..

Kes 7,261.00

Showing 851 to 860 of 913 (92 Pages)