Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 117019 results
Sort by: relevance publication year

Information technology. Security techniques. Information security management guidelines for telecommunications organizations based on ISO/IEC 27002

STANDARD published

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines

STANDARD published

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines

STANDARD published

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines

STANDARD published

Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines

STANDARD published

Information technology. Security techniques. Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry

STANDARD published

Information technology. Security techniques. Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry

STANDARD published

Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002

STANDARD published

Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045

STANDARD published

Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045

STANDARD published

Information technology. Security techniques. Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002

STANDARD published

Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045

STANDARD published

Information technology. Security techniques. Cybersecurity and ISO and IEC Standards

STANDARD published

Information technology. Security techniques. Cybersecurity and ISO and IEC Standards

STANDARD published

Review – ISO/IEC 24760-3:2016 Information technology — Security techniques — A framework for identity management — Part 3: Practice

JOURNAL ARTICLE published 18 June 2020 in IDPro Body of Knowledge

Authors: Espen Bago

Information technology. Security techniques. Guidelines for information security management systems auditing

STANDARD published

Information technology. Security techniques. Guidelines for information security management systems auditing

STANDARD published

Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

STANDARD published

Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1

STANDARD published

Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements

STANDARD published