Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 889 - 900 of 1752
Committee

MC/ISO/IEC JTC 1/SC 27

The development of standards for the protection of information and ICT. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as: Security requirements capture methodology...
Notice of Intent

Standard for Photovoltaic (PV) Luminaire Systems

1 Scope 1.1 These requirements apply to low voltage luminaire systems whose electrical power is derived from photovoltaic modules. Systems include, at a minimum, a photovoltaic (PV) module, storage batteries, one or more co...
Notice of Intent

Information technology - Telecommunications and...

Mobility for enterprise communications is the ability for persons and objects (e.g. vehicles, sensors and other machines) belonging to the enterprise to use communication and information services regardless of changes in...
Notice of Intent

Information technology -- Telecommunications ...

Link Aggregation provides protocols, procedures, and managed objects that allow the following: - One or more parallel instances of full-duplex point-to-point links to be aggregated together to form a Link Aggregation Group...
Notice of Intent

Information technology - Telecommunications and...

Mobility for enterprise communications is the ability for persons and objects (e.g. vehicles, sensors and other machines) belonging to the enterprise to use communication and information services regardless of changes in...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...