Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 1813 - 1824 of 3785
Notice of Intent

Information technology - Security techniques - ...

This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of...
Notice of Intent

Information technology - Concepts and usage of...

This document provides a usage scenario that utilizes the facilities defined in ISO/IEC 11179-3, ISO/IEC 19763-5 and ISO/IEC 19763-10 to demonstrate the registration of the mapping between process models. The availability of...
Notice of Intent

Personal identification - ISO-compliant driving...

The purpose of storing IDL data on machine-readable media on the IDL is to: increase productivity (of data and IDL use), facilitate electronic data exchange, and assist in authenticity and integrity validation. This document...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014 presents a general framework for the provision of time-stamping services. Time-stamping services may generate, renew and verify time-stamp tokens. Time-stamp tokens are associations between data and...
Notice of Intent

Information Technology - Software Measurement...

This Technical Report describes the characteristics of Functional Domains and the procedures by which characteristics of Functional User Requirements (FUR) can be used to determine Functional Domains. Two example methods for...
Notice of Intent

Information technology - Security techniques - ...

This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of...
Notice of Intent

Information Technology - Fibre Distributed Data...

This part of ISO/IEC 9314 defines a conformance test of the PHY functions in a path through an FDDI node. Figure 1 is a functional block diagram of an FDDI path. The path contains the necessary functions to repeat (that is...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any...