Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8449 - 8460 of 8784
Notice of Intent

Information security - Authenticated encryption

This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of...
Notice of Intent

Information technology - Information security...

This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and...
Notice of Intent

Information technology for learning, education...

This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers...
Notice of Intent

Information technology for learning, education...

This document provides a learner information model specific to mobile learning to enable learning, education and training environments to reflect the specific needs of mobile participants. This document provides: definitions...
Notice of Intent

Systems and software engineering - Software life...

This document provides the mapping expressing corresponding relations between software life cycle processes in ISO/IEC/IEEE 12207:2017 and the processes in ISO/IEC 12207:2008. These relations are demonstrated by means of...
Notice of Intent

Information technology - Service management - ...

This document includes guidance on the scope definition and applicability to the requirements specified in ISO/IEC 20000-1. This document can assist in establishing whether ISO/IEC 20000-1 is applicable to an organization’s...
Notice of Intent

Information technology - Security techniques - ...

This document specifies a methodology for the evaluation of non-deterministic or deterministic random bit generators intended to be used for cryptographic applications. The provisions given in this document enable the vendor...
Notice of Intent

Information technology - Multimedia application...

This document specifies the Multi-Image Application Format (MIAF), which contains coded images groups and sequences of images along with their metadata and the information about their relations to each other, all embedded in...