Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7585 - 7596 of 9033
Notice of Intent

Information technology - Information technology...

This document establishes guidelines for improving the energy effectiveness for computing models. Specifically, this document provides a reference computing model for evaluating end-to-end energy effectiveness a holistic...
Notice of Intent

Information technology - Process reference model...

This Technical Specification defines a process reference model (PRM) for the domain of information security management. The model architecture specifies a process architecture for the domain and comprises a set of processes...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies the ISO/IEC 21000 binary format which is an alternative serialization format of descriptions as specified within other ISO/IEC 21000 parts, e.g. ISO/IEC 21000-2. This enables the efficient...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to dedicated keystream generators in...
Notice of Intent

Information Technology - Home Electronic System...

This part of ISO/IEC 14543 specifies the general features and architecture of the HES. The object is to: Define new terms for use in the ISO/IEC 14543 series, Give general information and advice on the required HES features...
Notice of Intent

Information technology - Security techniques - ...

ISO/IEC 27034 provides guidance to assist organizations in integrating security into the processes used for managing their applications. This part of ISO/IEC 27034 presents an overview of application security. It introduces...
Notice of Intent

Information technology - Security techniques - ...

This document provides usage examples of ASCs for specific applications. NOTE Herein specified ASCs are provided for explanation purposes only and the audience is encouraged to create their own ASCs to assure the application...