Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3613 - 3624 of 6496
Notice of Intent

Information technology - User interface component...

This document gives guidance on how to create text alternatives and what information to put in text alternatives. This document applies to all static images that are used in any type of electronic document. It also applies to...
Notice of Intent

Software and systems engineering - Tools and ...

This document, within the context of methods and tools for product line product management: — defines product line-specific processes and their subprocesses for product management of software and systems product lines. Those...
Notice of Intent

Information security management - Guidelines ...

This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...
Notice of Intent

Information technology - Security techniques - ...

This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes: — the relationship between privacy...
Notice of Intent

IT Security techniques - Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent

Information technology - Programming languages...

1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent

IT Security techniques - Hash-functions - Part...

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...