Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities
Document status: Active
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements
Document status: Active
Information technology -- Segmented keyboard layouts
Document status: Active
Information technology -- Portable computer keyboard layouts
Document status: Active
Information technology - Open distributed processing - Reference model Enterprise language
Document status: Active
Information technology - Open distributed processing - Reference model - Enterprise language
Document status: Active
Information technology - Automatic identification and data capture techniques - Bar code print quality test specification - Two-dimensional symbols
Document status: Active
Information technology - Automatic identification and data capture techniques - Bar code symbol print quality test specification - Two-dimensional symbols
Document status: Active
Corrigendum 1 - Information technology -- Automatic identification and data capture techniques -- Bar code print quality test specification -- Two-dimensional symbols -
Document status: Active