Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8833 - 8844 of 9374
Notice of Intent

IT Security techniques — Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...
Notice of Intent

AMENDMENT 1 - Information security, cybersecurity...

SCOPE: CSA ISO/IEC 27001:24 This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014 -describes a general model for time-stamping services producing linked tokens -describes the basic components used to construct a time-stamping service producing linked tokens -defines the data...
Notice of Intent

Information security management — Guidelines ...

This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...