Information technology — Automatic identification and data capture techniques — Bar code verifier co...
ISO/IEC 15426-2:2015 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. It provides for testing of representative samples of the equipment.
NOTE ISO/IEC 15426‑1 applies…
Information technology - Security techniques - Network security - Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…
Information technology - Automatic identification and data capture techniques - Bar code verifier co...
ISO/IEC 15426-2:2015 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. It provides for testing of representative samples of the equipment.
NOTE ISO/IEC 15426‑1 applies…
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Product specification for polymermodified bitumen sheet, prefabricated and reinforced
1.1 General
1.1.1
This Standard covers polymer-modified (styrene-butadiene-styrene block copolymer and atactic
polypropylene) bitumen sheets intended for use as the plane of watertightness in roofing (including
roof flashings).
1.1.2
This Standard covers polymer-modified bitumen sheets that are manufactured in a factory as a single,
finished sheet and that are installed in a single layer…
Information technology for learning, education and training — A reference framework of e-Portfolio i...
ISO/IEC/TS 20013:2015 details a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and development.
The reference framework identifies content and functional components that…
Information technology for learning, education and training - A reference framework of e-Portfolio i...
ISO/IEC/TS 20013:2015 details a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and development.
The reference framework identifies content and functional components that…
Optique et photonique — Préparation des dessins pour éléments et systèmes optiques — Partie 19: Desc...
L'ISO 10110-19:2015 spécifie la représentation des exigences de conception et des exigences fonctionnelles des éléments et systèmes optiques sur les dessins techniques utilisés pour la fabrication et le contrôle.
L'ISO 10110-19:2015 donne une méthode générale pour décrire les surfaces et les composants. Elle s'applique aux surfaces continues et discontinues. Elle ne s'applique…
Entraînements électriques de puissance à vitesse variable - Partie 2: Exigences générales - Spécific...
L'IEC 61800-2:2015 s'applique aux systèmes d'entraînement électrique alternatifs à vitesse variable, incluant les convertisseurs à semi-conducteurs et les moyens permettant de les commander, de les protéger, de les surveiller, de les mesurer, ainsi que les moteurs à courant alternatif. Elle s'applique aux systèmes d'entraînement électrique à vitesse variable destinés à…