BSI BS ISO/IEC 27039 Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems (IDPS)
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC 33001 Information technology - Process assessment - Concepts and terminology - Second Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC/IEEE 24765 Systems and software engineering - Vocabulary - First Edition
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- ISO ISO/IEC 17789 Information technology - Cloud computing - Reference architecture - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- BSI BS ISO/IEC 27018 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- ISO ISO/IEC 27040 Information technology - Security techniques - Storage security - First Edition
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- BSI BS ISO/IEC 27043 Information technology — Security techniques — Incident investigation principles and processes
- ISO ISO/IEC 27035 Information technology - Security techniques - Information security incident management - First Edition
- BSI BS ISO/IEC 27039 Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems (IDPS)
- ISO ISO/IEC 27010 Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
British Standards Institution
Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems (IDPS)
N BS ISO/IEC 27039
Автоматический перевод:
Информационные технологии — методы Безопасности — Выбор, развертывание и операции систем обнаружения проникновения (IDPS)
Эквиваленты данного стандарта:
- DS DS/ISO/IEC 27039 Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems (IDPS)
- ISO ISO/IEC 27039 Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) - First Edition
Уважаемый пользователь!
Обратитесь к обслуживающему Вас представителю за дополнительной информацией о возможности приобретения документов указанного разработчика и заказа перевода.



