Electrotechincal

Electrotechincal



KS ISOIEC9798-4:1999

Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function

Specifies entity authentication mechanisms using a cryptographic check function..

Kes 2,307.00

KS ISO/IEC27014:2020

Information technology - Security techniques - Governance of information security.

Provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation...

Kes 2,647.00

KS ISO/IEC27041:2015

Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method.

Provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are fit for purpose...

Kes 2,647.00

KS ISOIEC 27032:2012

Information technology - Security techniques - Guidelines for cybersecurity

provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular:..

Kes 4,696.00

KS ISOIEC 27031:2011

Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity

This International Standard describes the concepts and principles of information and communication technology (ICT) readiness for business continuity, and provides a framework of methods and processes to identify and specify all aspects (such as pe..

Kes 4,326.00

KS ISOIEC 24762:2008

Information technology - Security techniques - Guidelines for information and communications technology disaster recovery services.

Describes the basic practices which ICT DR service providers, both in-house and outsourced, should consider..

Kes 5,222.00

KS ISO/IEC27042:2015

Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence.

Provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability...

Kes 2,533.00

KS ISO/IECTR 14516:2002

Information technology - Security techniques - Guidelines for the use and management of trusted third party services

Associated with the provision and operation of a trusted third party (TTP) are anumber of security-related issues for which general guidance is necessary to assist business entities, developers and relationships of TTPs and the entities using TTP AND..

Kes 3,090.00

KS ISO/IEC 10118-2:2010

Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher

specifies hash-functions which make use of an n-bit block cipher algorithm...

Kes 2,966.00

Showing 951 to 955 of 955 (96 Pages)