Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.
Information technology — Security techniques — Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002
60.60 Standard published
Packaging - Sacks - Method of sampling empty sacks for testing (ISO 7023:1983)
60.60 Standard published
Aerospace series - Aluminium alloy AL-P2024-T4 or T42 - Clad sheet and strip - 0,3 mm <a <6 mm
60.60 Standard published
Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity
60.60 Standard published
Information technology — Security techniques — Guidelines for cybersecurity
60.60 Standard published
Information technology — Security techniques — Network security — Part 1: Overview and concepts
60.60 Standard published
Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security
60.60 Standard published
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
60.60 Standard published
Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
60.60 Standard published
Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Networks (VPNs)
60.60 Standard published
Information technology — Security techniques — Network security — Part 6: Securing wireless IP network access
60.60 Standard published
Information technology — Security techniques — Application security — Part 1: Overview and concepts
60.60 Standard published
Information technology — Security techniques — Application security — Part 1: Overview and concepts — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Application security — Part 2: Organization normative framework
60.60 Standard published
Information technology — Application security — Part 3: Application security management process
60.60 Standard published
Information technology — Security techniques — Application security — Part 5: Protocols and application security controls data structure
60.60 Standard published
Information technology — Application security — Part 5-1: Protocols and application security controls data structure, XML schemas
60.60 Standard published