Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 589 - 600 of 12131
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 27033 describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security...
Notice of Intent

Information technology - Programming languages...

This International Standard specifies the form and meaning of programs written in Ada. Its purpose is to promote the portability of Ada programs to a variety of computing systems. Ada is a programming language designed to...
Notice of Intent

Information technology - Fibre channel - Part...

The measurement methods and specifications are intended to be used as part of a total signal performance compliance requirement set where the phase content of the signal is involved. A more generalized concept for jitter...