Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3877 - 3888 of 6436
Notice of Intent

Household and similar electrical appliances - ...

This clause of Part 1 is replaced by the following. This part of IEC 60335 deals with the safety of electric clothes dryers for drying textiles on racks located in a warm airflow, clothes dryers intended for drying footwear...
Notice of Intent

Information security, cybersecurity and privacy...

This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes...
Notice of Intent

Information security, cybersecurity and privacy...

This document provides guidance to assist organizations to: — fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks; — perform information security risk management activities...
Notice of Intent

Information technology - Information security...

This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing...
Notice of Intent

Information technology - Information security...

This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing...
Committee

MC/ISO/TC 205

Standardization in the design of new buildings and retrofit of existing buildings for acceptable indoor environment and practicable energy conservation and efficiency. Building environment design addresses the technical...
Notice of Intent

Amendment 1 - Information technology - Security...

ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper...
Notice of Intent

Amendment 2 - Information technology - Security...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent

Information security - Authenticated encryption

This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of...
Notice of Intent

Information technology - Information security...

This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and...