Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 61 - 72 of 131
Notice of Intent

Information Technology - Security Techniques...

This part of ISO/IEC 11770 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small set of possibilities...
Webpage

Conformity assessment courses

Our courses on standards development help deepen knowledge to effectively use standards and participate in their shaping their future. These courses are designed to give SCC members, and any professional interested in standards, the tools to get involved...
Notice of Intent

Information technology - Sharable content object...

1.1. Introduction to the SCORM Content Aggregation Model (CAM) Book The Sharable Content Object Reference Model (SCORM) is often described as a set of books on a bookshelf. The Content Aggregation Model (CAM) book is one of a...
Notice of Intent

Information technology - Sharable Content Object...

1.1. Introduction to the SCORM Content Aggregation Model (CAM) Book The Sharable Content Object Reference Model (SCORM) is often described as a set of books on a bookshelf. The Content Aggregation Model (CAM) book is one of a...
Article

Taking action to protect the planet

The effects of climate change are becoming more evident every year. That makes it vital to do everything we can to prevent and mitigate those effects while also adapting to make our world more resilient to them. SCC is at the...