ISO ISO/IEC 14888-1 Information technology - Security techniques - Digital signatures with appendix - Part 1: General - Second Edition
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- 35
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 35.180
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- Картотека зарубежных и международных стандартов
На него ссылаются
- В списке элементов: 16
- ISO ISO/IEC 27002 CORR 2 Information technology - Security techniques - Code of practice for information security controls TECHNICAL CORRIGENDUM 2 - Second EditionИнформационные технологии - методы Безопасности - Свод правил для управления защитой информации ТЕХНИЧЕСКОЕ ИСПРАВЛЕНИЕ 2 - Второй Выпуск
Карточка документа - BSI PD CEN ISO/TS 19299 Electronic fee collection - Security frameworkЭлектронный набор сбора - Концепция безопасности
Карточка документа - DIN CEN/TS 16735 Postal services - Extensible Common Structure and Representation for Postal Rates - EPR; English version CEN/TS 16735:2015Почтовые услуги - Расширяемая общая структура и представительство почтовых тарифов - EPR; английская формулировка CEN/TS 16735:2015
Карточка документа - CEN CEN/TS 16735 Postal services - Extensible Common Structure and Representation for Postal Rates - EPRПочтовые службы - Расширяемая Общая Структура и Представление для Почтовых Ставок - EPR
Карточка документа - ISO ISO/IEC 24727-4 AMD 1 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration AMENDMENT 1 - First EditionУдостоверения личности - интерфейсы программирования карты Интегральной схемы - Часть 4: ПОПРАВКА 1 администрирования Прикладного программного интерфейса (API) - Первый Выпуск
Карточка документа - DIN CEN/TS 16439 Electronic fee collection - Security frameworkЭлектронный набор сбора - Концепция безопасности
Карточка документа - CSA CAN/CSA-ISO/IEC 18033-1A-06 Information technology - Security techniques - Encryption algorithms - Part 1: General - AMENDMENT 1Информационные технологии - методы безопасности - Алгоритмы шифрования - Часть 1: Общий - AMENDMENT 1
Карточка документа - CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: GeneralИнформационные технологии - методы безопасности - механизмы идентификации предприятия - часть 1: общий
Карточка документа - BSI BS ISO/IEC 29150 Information technology - Security techniques - Signcryption - CORR: April 30, 2014Информационные технологии - методы Безопасности - Signcryption - ПОПРАВКА: 30 апреля 2014
Карточка документа - BSI BS ISO/IEC 9796-2 Information technology - Security techniques - Digital signature schemes giving message recovery Part 2: Integer factorization based mechanismsИнформационные технологии - методы Безопасности - Схемы цифровой подписи, дающие Часть 2 восстановления сообщения: Целочисленная факторизация базировала механизмы
Карточка документа - CSA CAN/CSA-ISO/IEC 13888-1-10 Information technology - Security techniques - Non-repudiation - Part 1: GeneralИнформационные технологии - методы Безопасности - Неотказ - Часть 1: Общий
Карточка документа - CSA CAN/CSA-ISO/IEC 7816-4-06 AMD 1 Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange - AMENDMENT 1: Record activation and deactivationУдостоверения личности - карты Интегральной схемы - Часть 4: Организация, безопасность и команды для обмена - ПОПРАВКА 1: Рекордная активация и деактивация
Карточка документа - ISO ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation - Part 1: General - Third EditionИнформационные технологии - методы Безопасности - Неотказ - Часть 1: Общий - Третий Выпуск
Карточка документа - CSA CAN/CSA-ISO/IEC 11770-3-09 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques - Incorporates Corrigendum 1: December 2010Информационные технологии - методы Безопасности - Ключевой менеджмент - Часть 3: Механизмы с помощью асимметричных методов - Включают Исправление 1: декабрь 2010
Карточка документа - BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanismsИнформационные технологии - методы безопасности - Цифровые подписи с приложением - Часть 2: Целочисленная факторизация основывала механизмы
Карточка документа - ISO ISO/IEC 9796-3 Information technology Security techniques Digital signature schemes giving message recovery Part 3: Discrete logarithm based mechanisms - Second EditionСхемы Цифровой подписи методов безопасности информационных технологий, дающие Часть 3 восстановления сообщения: Дискретный логарифм основывал механизмы - Второй Выпуск
Карточка документа



