Search

Refine Results
Type
Status
Period range

From

To

Displaying 1429 - 1440 of 3570
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of...
Notice of Intent

Information technology - Programming languages...

Scope This Technical Report specifies the syntax and semantics for XML support in COBOL. The purpose of this Technical Report is to promote a high degree of portability in implementations, even though some elements are...
Notice of Intent

Polyethylene (PE) Pipe and Fittings for Soil ...

This standard applies to flexible pipe, 75 mm to 375 mm in diameter, perforated or not, with annular corrugations. This standard applies also to the PE plastic fittings required for the installation of PE pipe. This document...
Notice of Intent

Drinking Water System Components - Lead Content

Thi standard establishes a limit on the amount of lead that may be contained within the water contact materials in a drinking water contact product. This standard also defines the test methodology for the analytical...
Identification cards — Contactless integrated circuit cards — Proximity cards Part 4: Transmission protocol AMENDMENT 3: Bit rates of 3fc/4, fc, 3fc/2 and 2fc from PCD to PICC
1. Scope This part of ISO/IEC 14443 specifies a half-duplex block transmission protocol featuring the special needs of a contactless environment and defines the activation and deactivation sequence of the protocol. This part...
Notice of Intent

Power Transformer and Reactor Bushings

1.1 This Standard applies to outdoor bushings that have lightning impulse insulation levels 110-1950kV. They are for use as components of liquid-filled transformers and reactors on systems with a nominal voltage of 15-765 kV...
Notice of Intent

Information Technology - Security Techniques...

1. Scope This part of ISO/IEC 18028 defines a network security architecture for providing end-to-end network security. The architecture can be applied to various kinds of networks where end-to-end security is a concern and...