Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 1189 - 1200 of 5829
Information Technology - Open Systems Interconnection - Generic Upper Layers Security: Protecting Transfer Syntax Protocol Implementation Conformance Statement (PICS) Proforma
This Recommendation / International Standard defines a Protocol Implementation Conformance Statement (PICS) proforma for the detailed expression of the conformance requirements of ITU-T Rec. X.833 / ISO/IEC 11586-4 and Annex...
Notice of Intent

Information Technology - Telecommunications and...

This International Standard specifies the Transit Counter additional network feature (ANF-TC), which is applicable to various basic services supported by Private Integrated Services Networks (PISN). Basic services are...
Notice of Intent

Information technology — JPEG 2000 image coding...

1. Scope This Recommendation International Standard defines a set of lossless (bit-preserving) and lossy compression methods for coding bi-level, continuous-tone grey-scale, palletized color, or continuous-tone colour digital...
Notice of Intent

Information technology — JPEG 2000 image coding...

1. Scope This Recommendation International Standard defines a set of lossless (bit-preserving) and lossy compression methods for coding bi-level, continuous-tone grey-scale, palletized color, or continuous-tone colour digital...
Notice of Intent

Information technology — JPEG 2000 image coding...

1. Scope This Recommendation International Standard defines a set of lossless (bit-preserving) and lossy compression methods for coding bi-level, continuous-tone grey-scale, palletized color, or continuous-tone colour digital...
Notice of Intent

Information technology - Programming languages...

This Technical Report specifies a series of extensions of the programming language C, specified by International Standard ISO/IEC 9899:1999. These extensions can be useful in the mitigation of security vulnerabilities in...