Information technology. Network security-Guidelines for network virtualization security
Document status: Active
Information technology. Security techniques. Application security-Overview and concepts
Document status: Active
Information technology. Application security-Application security management process
Document status: Active
Information technology. Security techniques. Application security-Protocols and application security controls data structure
Document status: Active
Information technology. Application security-Assurance prediction framework
Document status: Active
Information technology. Information security incident management-Principles and process
Document status: Active
Information technology. Information security incident management-Guidelines to plan and prepare for incident response
Document status: Active
Information technology. Security techniques. Information security incident management
Document status: Active
Information technology. Information security incident management-Guidelines for ICT incident response operations
Document status: Active
Information technology. Security techniques. Information security for supplier relationships-Overview and concepts
Document status: Active