Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8605 - 8616 of 8785
Notice of Intent

Information technology — Development of user ...

This document takes a holistic approach to the accessibility of information and communications technology (ICT) by combining guidance on implementing the accessibility of ICT systems (ICT accessibility) both at organizational...
Notice of Intent

Information technology — Conformance testing ...

This part of ISO/IEC 29109 specifies elements of conformance testing methodology, test assertions, and test procedures as applicable to ISO/IEC 19794-7. ISO/IEC 19794-7 defines two data interchange formats for signature/sign...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Notice of Intent

Information technology — Conformance testing ...

Note: The ICS code of this Notice of Intent (originally published on October 16, 2024) was updated by the responsible SDO on November 5, 2024. This part of ISO/IEC 29109 specifies elements of conformance testing methodology...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...