Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 4753 - 4764 of 5826
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 3: Radio frequency identification (RFID)
This part of ISO/IEC 19762 provides terms and definitions unique to radio frequency identification (RFID) in the area of automatic identification and data capture techniques. This glossary of terms enables the communication...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 1: General terms relating to AIDC
This part of ISO/IEC 19762 provides general terms and definitions in the area of automatic identification and data capture techniques on which are based further specialized sections in various technical fields, as well as the...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 2: Optically readable media (ORM)
This part of ISO/IEC 19762 provides terms and definitions unique to optically readable media (ORM) in the area of automatic identification and data capture techniques. This glossary of terms enables the communication between...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014: - identifies the objective of a time-stamping authority; - describes a general model on which time-stamping services are based; - defines time-stamping services; - defines the basic protocols...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It includes the evaluation assurance levels (EALs) that define a scale for measuring assurance for component TOEs, the composed assurance...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common...
Notice of Intent

Identification cards - Contactless integrated...

1. Scope This part of ISO/IEC 14443 specifies a half-duplex block transmission protocol featuring the special needs of a contactless environment and defines the activation and deactivation sequence of the protocol. This part...