Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 37 - 48 of 245
Publications

SCC Requirements and Guidance for Accreditation...

This document specifies the requirements and guidance for the accreditation of Greenhouse Gas (GHG) Verifiers for International Civil Aviation Organization’s Carbon Offsetting and Reduction Scheme for International Aviation...
Notice of Intent

Information technology - Security techniques - ...

This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information...
Notice of Intent

Information technology - Security techniques - ...

This International Standard provides guidelines for information security risk management. This International Standard supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory...
Notice of Intent

Security techniques - Extension to ISO/IEC 27001...

This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and...
Notice of Intent

Information technology - Security techniques...

This International Standard focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005. It describes the process...
Notice of Intent

Information technology - Smart City ICT reference...

1 Scope This document specifies a generic knowledge management framework for a smart city, focusing on creating, capturing, sharing, using and managing smart city knowledge. It also gives the key practices which are required...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies how to include IPMP information and protected parts of Digital Items in a DIDL document. It purposely does not specify protection measures, keys, key management, trust management...