Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 649 - 660 of 773
Notice of Intent

Information technology - Data centre facilities...

This document addresses power supplies to, and power distribution within, data centres based upon the criteria and classifications for “availability”, “physical security” and “energy efficiency enablement” within ISO/IEC...
Notice of Intent

Information technology - Sharable content object...

1.1. Introduction to the SCORM Content Aggregation Model (CAM) Book The Sharable Content Object Reference Model (SCORM) is often described as a set of books on a bookshelf. The Content Aggregation Model (CAM) book is one of a...
Notice of Intent

Information technology - Sharable Content Object...

1.1. Introduction to the SCORM Content Aggregation Model (CAM) Book The Sharable Content Object Reference Model (SCORM) is often described as a set of books on a bookshelf. The Content Aggregation Model (CAM) book is one of a...
Notice of Intent

Instrument Transformers – Part 10: additional...

This part of IEC 61869 is a product standard and covers only additional requirements for low- power passive current transformers. The product standard for low-power passive current transformers comprises IEC 61869-1, together...
Notice of Intent

Information security - Security requirements, ...

This document specifies a general framework for the security evaluation of quantum key distribution (QKD) according to the ISO/IEC 15408 series. Specifically, it specifies a baseline set of common security functional...
Notice of Intent

AMENDMENT 1 - Information technology - Security...

Scope: CSA ISO/IEC 9797-1:12 (R2021) This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security...
Notice of Intent

Information technology - Artificial intelligence...

This document provides guidance for identifying the context, opportunities and processes for developing and applying AI applications. The guidance provides a macro-level view of the AI application context, the stakeholders...
Notice of Intent

Cybersecurity - Guidelines for Internet security

This document provides: - an explanation of the relationship between Internet security, web security, network security and cybersecurity; - an overview of Internet security; - identification of interested parties and a...