Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 589 - 600 of 9875
Notice of Intent

Information technology - Coding of audio-visual...

Since CASE adoption is a subject of the broader technology transition problem, this Technical Report addresses the adoption practices appropriate for a wide range of computing organisations. This Technical Report neither...
Notice of Intent

Information technology - TLS specification for...

This specification is relevant to anyone involved in owning, operating or using data storage devices. This includes senior managers, acquirers of storage product and service, and other non-technical managers or users, in...
Notice of Intent

Information technology -- Multimedia content ...

1.1 Organization of the document ISO/IEC 15938-13:2015 is as follows. Clauses 2-3 specify the terms, abbreviations, symbols and conventions used in the document. Clause 4 specifies the binary representation syntax and...
Notice of Intent

Information technology -- W3C SOAP Version 1....

SOAP Version 1.2 is a lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. ISO/IEC 42020:2011 defines a set of adjuncts for use with the SOAP Version 1.2 messaging...
Notice of Intent

Information technology -- Governance of IT -- ...

ISO/IEC TR 38502:2014 provides guidance on the nature and mechanisms of governance and management together with the relationships between them, in the context of IT within an organization. The purpose of ISO/IEC TR 38502:2014...
Notice of Intent

Information technology -- Security techniques...

This International Standard provides guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS). In particular, it addresses the selection, deployment, and operations of IDPS...
Notice of Intent

Information technology - Security techniques - ...

This International Standard provides guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS). In particular, it addresses the selection, deployment, and operations of IDPS...