BSI BS ISO/IEC 27004 Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
British Standards Institution
Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation
N BS ISO/IEC 27004
Автоматический перевод:
Информационные технологии - методы безопасности - управление информационной безопасностью - Контроль, измерение, анализ и оценка
Эквиваленты данного стандарта:
- CSA CAN/CSA-ISO/IEC 27004-10 Information technology - Security techniques - Information security management - Measurement
- ISO ISO/IEC 27004 Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation - Second Edition
- DS DS/ISO/IEC 27004 Information technology – Security techniques – Information security management – Monitoring, measurement, analysis and evaluation
Уважаемый пользователь!
Обратитесь к обслуживающему Вас представителю за дополнительной информацией о возможности приобретения документов указанного разработчика и заказа перевода.



