Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 613 - 624 of 12276
Notice of Intent

Systems and software engineering - Software life...

This International Standard establishes a common framework for software life cycle processes, with well-defined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that...
Notice of Intent

Information technology - Database languages - ...

This part of ISO/IEC 9075 specifies the ability to invoke static methods written in the Java(TM) programming language as SQL-invoked routines and to use classes defined in the Java programming language as SQL structured user...
Notice of Intent

Information technology - Security techniques - ...

The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Notice of Intent

Identification cards - Test methods - Part 7: ...

ISO/IEC 10373 defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810. Each test method is cross-referenced to one or more base standards, which may be ISO/IEC 7810...
Notice of Intent

Chain Saws

1.1 This Standard applies to portable, handheld, fuel- and electrically powered chain saws intended for forestry and other wood-cutting applications. It describes safety and environmental requirements for the design of chain...
Notice of Intent

Information technology - Database languages - ...

Scope This part of ISO/IEC 9075 defines the structures and procedures that may be used to execute statements of the database language SQL from within an application written in a programming language in such a way that...
Notice of Intent

Identification cards - Recording technique - ...

ISO/IEC 7811 defines the characteristics for identification cards as defined in Clause 4 of this part of ISO/IEC 7811 and the use of such cards for international interchange. This part of ISO/IEC 7811 specifies requirements...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...