Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7117 - 7128 of 9142
Information technology -- Learning, education, and training -- Content packaging -- Part 1: Information model
1 Scope This part of ISO/IEC 12785 defines the data structures that can be used to exchange language, education and training (LET) content among systems that wish to import, export, aggregate, and disaggregate packages of LET...
Information technology — Learning, education, and training — Content packaging — Part 2: XML binding
1 Scope This part of ISO/IEC 12785 specifies how to represent the ISO/IEC 12785-1 information model in XML, and details each element binding of the content packaging XML schema.
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 3: Radio frequency identification (RFID)
This part of ISO/IEC 19762 provides terms and definitions unique to radio frequency identification (RFID) in the area of automatic identification and data capture techniques. This glossary of terms enables the communication...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 1: General terms relating to AIDC
This part of ISO/IEC 19762 provides general terms and definitions in the area of automatic identification and data capture techniques on which are based further specialized sections in various technical fields, as well as the...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 2: Optically readable media (ORM)
This part of ISO/IEC 19762 provides terms and definitions unique to optically readable media (ORM) in the area of automatic identification and data capture techniques. This glossary of terms enables the communication between...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014: - identifies the objective of a time-stamping authority; - describes a general model on which time-stamping services are based; - defines time-stamping services; - defines the basic protocols...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It includes the evaluation assurance levels (EALs) that define a scale for measuring assurance for component TOEs, the composed assurance...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common...
Notice of Intent

Identification cards - Contactless integrated...

1. Scope This part of ISO/IEC 14443 specifies a half-duplex block transmission protocol featuring the special needs of a contactless environment and defines the activation and deactivation sequence of the protocol. This part...
Identification cards - Optical memory cards - Linear recording method - Part 4: Logical data structures
This part of ISO/IEC 11694 specifies the logical data structures for optical memory cards necessary to allow compatibility and interchange between systems using the linear recording method.
Information technology - Database languages - SQL - Part 13: SQL routines and types using the java programming language (SQL/JRT)
This part of ISO/IEC 9075 specifies the ability to invoke static methods written in the Java(TM) programming language as SQL-invoked routines and to use classes defined in the Java programming language as SQL structured user...