Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 769 - 780 of 11720
Notice of Intent

Information Technology - Computer Graphics - ...

1 Scope ISO/IEC 8632 provides a file format suitable for the storage and retrieval of picture description information. The file format consists of an ordered set of elements that may be used to describe pictures in a way that...
Notice of Intent

Information technology - Service management — ...

This document provides guidance on the relationship between ISO/IEC 20000-1:2011 and CMMI-SVC V1.3 (through Maturity Level 3). Service providers can refer to this guidance as a cross-reference between the two documents to...
Notice of Intent

Explosion - proof equipment

1.1 This Standard applies to explosion-proof electrical equipment suitable for use in hazardous locations in accordance with CSA C22.1, Canadian Electrical Code, Part I and the requirements of CSA M421. It applies to...
Notice of Intent

Information Technology - SGML Applications - ...

NOTE 1 This clause defines the scope of this International Standard. It should not be confused with the concept of .scope. defined in 3.16, which only applies in the context of topic maps. Topic maps enable multiple...
Notice of Intent

Information Technology - SGML Applications - ...

NOTE 1 This clause defines the scope of this International Standard. It should not be confused with the concept of .scope. defined in 3.16, which only applies in the context of topic maps. Topic maps enable multiple...
Information Technology - Guidelines for the Documentation of Computer-Based Application Systems
1. Scope This International Standard gives guidelines for the documentation of information systems (ISs) and is intended for use in that area. This International Standard is applicable to the software of IS. However, some...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...