Refine Results
Displaying 61 - 72 of 131
Notice of Intent
Information Technology - Security Techniques...
This part of ISO/IEC 11770 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities...
Webpage
Conformity assessment courses
Our courses on standards development help deepen knowledge to effectively use standards and participate in their shaping their future. These courses are designed to give SCC members, and any professional interested in standards, the tools to get involved...
Notice of Intent
Information technology - Sharable content object...
1.1. Introduction to the SCORM Content Aggregation Model (CAM) Book The Sharable Content Object Reference Model (SCORM) is often described as a set of books on a bookshelf. The Content Aggregation Model (CAM) book is one of a...
Notice of Intent
Information technology - Sharable Content Object...
1.1. Introduction to the SCORM Content Aggregation Model (CAM) Book The Sharable Content Object Reference Model (SCORM) is often described as a set of books on a bookshelf. The Content Aggregation Model (CAM) book is one of a...
Article
Taking action to protect the planet
The effects of climate change are becoming more evident every year. That makes it vital to do everything we can to prevent and mitigate those effects while also adapting to make our world more resilient to them. SCC is at the...