Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3229 - 3240 of 10760
Notice of Intent

Information technology - Security techniques - ...

This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with respect to typical VSs are...
Notice of Intent

Information technology - Multimedia application...

This document specifies a file format which is capable of storage, interchange, management, editing and presentation of multiple sensorial media contents based on the ISO base media file format. The file format provides the...
Notice of Intent

Information technology - Multimedia application...

This document specifies a data structure called “bridget”. A bridget is a link between a “source” content and a “destination” content. The bridget contains information on the source content and on the destination content, on...
Notice of Intent

Information technology - High efficiency coding...

This part of ISO/IEC 23000 specifies a file format designed for mid-resolution “DVD-style” video applications. The file format provides the overall structure for storing video contents, images, metadata, and user interface in...
Notice of Intent

Information technology - Security techniques - ...

This document: — gives guidelines for the identity proofing of a person; — specifies levels of identity proofing, and requirements to achieve these levels. This document is applicable to identity management systems.
Notice of Intent

Information technology - Security techniques - ...

This document provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards. This document is applicable to all types and sizes...
Notice of Intent

Information technology -- Security techniques...

This document defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views contextualizing...