Refine Results
Displaying 5485 - 5496 of 10864
Notice of Intent
Information technology - Security techniques - ...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent
Information technology - Security techniques - ...
1 Scope (there is a diagram that's part of the scope that isn't attached) To prove ownership of an ITU-T X.509 certificate registered individually with the registration authority (RA), a biometric hardware security module has...
Notice of Intent
Standard for Safety for In-building 2-Way Emergency...
1.1 These requirements cover products (e.g. repeater, transmitter, receiver, signal booster components, external filters, and battery charging system components) used for in-building 2-way radio emergency radio communication...
Notice of Intent
Explosive atmospheres - Part 25: Intrinsically...
This part of IEC 60079 contains the specific requirements for construction and assessment of intrinsically safe electrical systems, type of protection "i", intended for use, as a whole or in part, in locations in which the...
Notice of Intent
Event sustainability management systems - Requirements...
This International Standard specifies requirements for an event sustainability management system for any type of event or event-related activity, and provides guidance on conforming to those requirements. This International...
Notice of Intent
Information technology -- Security techniques...
This part of ISO/IEC 27033 describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security...
Notice of Intent
Information technology -- Security techniques...
This part of ISO/IEC 27033 gives guidance for securing communications between networks using security gateways (firewall, application firewall, Intrusion Protection System, etc.) in accordance with a documented information...
Notice of Intent
Information technology - Security techniques - ...
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent
Information technology - Home electronic systems...
This part of ISO/IEC 14543-5 specifies the core protocol of IGRS user and device remote access, including intelligent grouping and resource sharing. The protocol features are: a) IGRS RA user and IGRS RA device concepts and...
Notice of Intent
Information technology - Small computer system...
This part of ISO/IEC 14776 defines the command set extensions to facilitate operation of SCSI direct access block devices. The clauses in this standard, implemented in conjunction with the applicable clauses of SPC-4, specify...
Notice of Intent
Information technology -- Security techniques...
This part of ISO/IEC 27036 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These...
Notice of Intent
Information technology -- Security techniques...
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining...