Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 3505 - 3516 of 5460
Notice of Intent

Ballasts for Tubular Fluorescent Lamps - General...

This standard covers ballasts, excluding resistance types, for use on a.c. supplies up to 1 000 V at 50 Hz or 60 Hz, associated with tubular fluorescent lamps with or without pre-heated cathodes operated with or without a...
Notice of Intent

Information technology -- Learning, education...

This Standard specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the...
Notice of Intent

Amendment 1 - Cards and security devices for ...

Scope: CSA ISO/IEC 14443-2 This document specifies the characteristics of the fields to be provided for power and bi-directional communication between proximity coupling devices (PCDs) and proximity cards or objects (PICCs)...
Notice of Intent

Information security - Time-stamping services...

This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier...
Notice of Intent

Energy management systems — Guidelines for a ...

This document gives guidance for organizations on establishing a phased approach to implement an energy management system (EnMS). Theis phased approach is intended to support a simplify implementation of an EnMS for all types...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...