Information technology. Security techniques. Evaluation criteria for IT security-Security assurance requirements
Document status: Active
Information technolgy. Security techniques. Evaluation criteria for IT security-Security assurance components
Document status: Active
Information security, cybersecurity and privacy protection. Evaluation criteria for IT security-Security assurance components
Document status: Active
Information security, cybersecurity and privacy protection. Evaluation criteria for IT security-Framework for the specification of evaluation methods and activities
Document status: Active
Information security, cybersecurity and privacy protection. Evaluation criteria for IT security-Pre-defined packages of security requirements
Document status: Active
Information technology. Open distributed processing. Reference model. Enterprise language
Document status: Active
Information technology. Open distributed processing. Reference model. Enterprise language
Document status: Active
Information technology. Automatic identification and data capture techniques. Bar code print quality test specification. Two-dimensional symbols
Document status: Active
Information technology. Automatic identification and data capture techniques. Bar code symbol print quality test specification. Two-dimensional symbols
Document status: Active
Information technology. Automatic identification and data capture techniques. Bar code symbology specification. Code 128
Document status: Active