Information technology - Security techniques - IT network security, Part 5: Securing communications across networks using virtual private networks
Document status: [ Withdrawn ]
Information technology - Security techniques - Encryption algorithms, Part 1: General
Document status: [ Withdrawn ]
Information technology - Security techniques - Encryption algorithms, Part 2: Asymmetric ciphers
Document status: [ Withdrawn ]
Information technology - Security techniques - Encryption algorithms, Part 3: Block ciphers
Document status: [ Withdrawn ]
Information technology - Security techniques - Encryption algorithms, Part 4: Stream ciphers
Document status: [ Withdrawn ]
Information technology - Security techniques - Information security incident management
Document status: [ Withdrawn ]
Information technology - Automated infrastructure management (AIM) systems - Requirements, data exchange and applications
Document status: [ Current ]
Information technology - Open Distributed Processing, Part 2: General Inter-ORB Protocol (GIOP)/Internet Inter-ORB Protocol (IIOP)
Document status: [ Withdrawn ]
Software Engineering - Guide to the Software Engineering Body of Knowledge (SWEBOK)
Document status: [ Withdrawn ]
Software engineering - A guide for the application of AS/NZS ISO/IEC 15288 (System life cycle processes)
Document status: [ Withdrawn ]