Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 20 of 34 results

ISO - ISO/IEC 24775-5 - INFORMATION TECHNOLOGY – STORAGE MANAGEMENT – PART 5: FILESYSTEMS - FIRST EDITION Organization: ISO
Date: 2014-12-01
Description: This part of ISO/IEC 24775 defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support and access to file data.
DSF/ISO/IEC DIS 24775-5 - INFORMATION TECHNOLOGY - STORAGE MANAGEMENT - PART 5: FILE SYSTEMS Organization: DS
Description: This part of ISO/IEC 24775 defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support and access to file data.
DS/ISO/IEC 24775-5 - INFORMATION TECHNOLOGY - STORAGE MANAGEMENT - PART 5: FILE SYSTEMS Organization: DS
Date: 2015-01-19
Description: This part of ISO/IEC 24775 defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support and access to file data.
CSA ISO/IEC TR 10032 - INFORMATION TECHNOLOGY - REFERENCE MODEL OF DATA MANAGEMENT Organization: CSA
Date: 2004-01-01
Description: Such concepts are used to define more specifically the services provided by particular data management components, such as database management systems or data dictionary systems. The definition of such related services identifies interfaces which may be the subject of future standardization.
VDI 3601 - WAREHOUSE MANAGEMENT SYSTEMS Organization: VDI
Date: 2015-09-01
Description: In current language, the term “warehouse management” is used to describe the management, control and optimisation of storage and distribution systems. The fundamental functions of warehouse managementcover quantity and storage location management and control as well as disposition of conveying means.
DS/ISO/TR 17370 - APPLICATION GUIDELINE ON DATA CARRIERS FOR SUPPLY CHAIN MANAGEMENT Organization: DS
Date: 2013-06-28
Description: In particular, it - specifies the relationship of various global standards related to the supply chain, - illustrates the types and data structures in the layered supply chain network, - specifies the relationship among the layered structure of the supply chain, - specifies the management of serial numbers in supply chain management, - specifies data storage on the named data carriers, - specifies the required data volume for each data carrier, - specifies the data structure between the data carrier and the reader (interrogator), - specifies the data structure between the host system (computer) and the reader (interrogator), and - illustrates complex data carriers (rewritable hybrid media, etc).
ISO - ISO TR 17370 - APPLICATION GUIDELINE ON DATA CARRIERS FOR SUPPLY CHAIN MANAGEMENT - FIRST EDITION Organization: ISO
Date: 2013-06-15
Description: In particular, it — specifies the relationship of various global standards related to the supply chain, — illustrates the types and data structures in the layered supply chain network, — specifies the relationship among the layered structure of the supply chain, — specifies the management of serial numbers in supply chain management, — specifies data storage on the named data carriers, — specifies the required data volume for each data carrier, — specifies the data structure between the data carrier and the reader (interrogator), — specifies the data structure between the host system (computer) and the reader (interrogator), and — illustrates complex data carriers (rewritable hybrid media, etc).
ISO - ISO/IEC DIS 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY Organization: ISO
Date: 2017-01-06
Description: This includes in particular the following: - central and distributed process control, monitoring and automation technology as well as information systems used for their operation, such as programming and parameterization devices; - digital controllers and automation components such as control and field devices or Programmable Logic Controllers (PLCs), including digital sensor and actuator elements; - all further supporting information systems used in the process control domain, e.g. for supplementary data visualization tasks and for controlling, monitoring, data archiving, historian logging, reporting and documentation purposes; - communication technology used in the process control domain, e.g. networks, telemetry, telecontrol applications and remote control technology; - Advanced Metering Infrastructure (AMI) components, e.g. smart meters; measurement devices, e.g. for emission values; - digital protection and safety systems, e.g. protection relays, safety PLCs, emergency governor mechanisms; - energy management systems, e.g. of distributed energy resources (DER), electric charging infrastructures, in private households, residential buildings or industrial customer installations; - distributed components of smart grid environments, e.g. in energy grids, in private households, residential buildings or industrial customer installations; - all software, firmware and applications installed on above mentioned systems, e.g. DMS (Distribution Management System) applications or OMS (Outage Management System) ; - any premises housing the above mentioned equipment and systems; - remote maintenance systems for above mentioned systems.
DS/ISO/IEC TR 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY Organization: DS
Date: 2013-08-30
Description: These are covered by the standard ¡§ISO/IEC 27011:2008 Information technology ¡V Security techniques ¡V Information security management guidelines for telecommunications organizations based on ISO/IEC 27002¡¨. It is recommended that users of this guideline should implement the measures defined in that standard for the telecommunication systems and components used in the process control environment.
ISO - ISO/IEC TR 27019 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES BASED ON ISO/IEC 27002 FOR PROCESS CONTROL SYSTEMS SPECIFIC TO THE ENERGY UTILITY INDUSTRY - FIRST EDITION Organization: ISO
Date: 2013-07-15
Description: These are covered by the standard "ISO/IEC 27011:2008 Information technology – Security techniques – Information security management guidelines for telecommunications organizations based on ISO/IEC 27002". It is recommended that users of this guideline should implement the measures defined in that standard for the telecommunication systems and components used in the process control environment.
ISO - ISO/IEC 25024 - SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE QUALITY REQUIREMENTS AND EVALUATION (SQUARE) - MEASUREMENT OF DATA QUALITY - FIRST EDITION Organization: ISO
Date: 2015-10-15
Description: It can be applied in many types of information systems, for example, such as follows: — legacy information system; — data warehouse; — distributed information system; — cooperative information system; — world wide web.
ISO - ISO/IEC 23001-7 - INFORMATION TECHNOLOGY - MPEG SYSTEMS TECHNOLOGIES - PART 7: COMMON ENCRYPTION IN ISO BASE MEDIA FILE FORMAT FILES - THIRD EDITION Organization: ISO
Date: 2016-02-15
Description: File, track, and track fragment metadata is specified to enable multiple digital rights and key management systems (DRMs) to access the same common encrypted file or stream. This part of ISO/IEC 23001 does not define a DRM system.
DNVGL-RP-0496 - CYBER SECURITY RESILIENCE MANAGEMENT FOR SHIPS AND MOBILE OFFSHORE UNITS IN OPERATION Organization: DNVGL
Date: 2016-09-01
Description: — Certification of the Information Security Management System (ISMS) to the international standard ISO/ IEC 27001. Cyber security resilience has many aspects in common with general quality management systems.
DSF/ISO/DIS 11783-10 - TRACTORS AND MACHINERY FOR AGRICULTURE AND FORESTRY - SERIAL CONTROL AND COMMUNICATIONS DATA NETWORK - PART 10: TASK CONTROLLER AND MANAGEMENT INFORMATION SYSTEM DATA INTERCHANGE Organization: DS
Description: Its purpose is to standardize the method and format of transfer of data between sensors, actuators, control elements and information storage and display units, whether mounted on, or part of, the tractor or implement.
DS/ISO 11783-10 - TRACTORS AND MACHINERY FOR AGRICULTURE AND FORESTRY - SERIAL CONTROL AND COMMUNICATIONS DATA NETWORK - PART 10: TASK CONTROLLER AND MANAGEMENT INFORMATION SYSTEM DATA INTERCHANGE Organization: DS
Date: 2015-11-13
Description: Its purpose is to standardize the method and format of transfer of data between sensors, actuators, control elements, and information storage and display units, whether mounted on, or part of, the tractor or implement.
DSF/ISO/FDIS 11783-10 - TRACTORS AND MACHINERY FOR AGRICULTURE AND FORESTRY -- SERIAL CONTROL AND COMMUNICATIONS DATA NETWORK-- PART 10: TASK CONTROLLER AND MANAGEMENT INFORMATION SYSTEM DATA INTERCHANGE Organization: DS
Description: Its purpose is to standardize the method and format of transfer of data between sensors, actuators, control elements, and information storage and display units, whether mounted on, or part of, the tractor or implement.
ISO - ISO 11783-10 - TRACTORS AND MACHINERY FOR AGRICULTURE AND FORESTRY - SERIAL CONTROL AND COMMUNICATIONS DATA NETWORK - PART 10: TASK CONTROLLER AND MANAGEMENT INFORMATION SYSTEM DATA INTERCHANGE - SECOND EDITION Organization: ISO
Date: 2015-09-15
Description: Its purpose is to standardize the method and format of transfer of data between sensors, actuators, control elements, and information storage and display units, whether mounted on, or part of, the tractor or implement.
DSF/ISO/DIS 9564-4 - FINANCIAL SERVICES -- PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - REQUIREMENTS FOR PIN HANDLING IN ECOMMERCE FOR PAYMENT TRANSACTIONS Organization: DS
Description: protection against replay of the transaction, ? specific key management techniques, ? access to, and storage of, card data other than the PIN by applications such as wallets.
DSF/ISO/FDIS 9564-4 - FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 4: REQUIREMENTS FOR PIN HANDLING IN ECOMMERCE FOR PAYMENT TRANSACTIONS Organization: DS
Description: ., - management of cardholder PINs for use as a means of cardholder verification in retail banking systems in, notably, automated teller machine (ATM) systems, point-of-sale (POS) terminals, automated fuel dispensers, vending machines, banking kiosks and PIN selection/change systems, which are covered in ISO 9564-1, - card proxies such as mobile phones or key fobs, - approved algorithms for PIN encipherment, which are covered in ISO 9564-2, - the protection of the PIN against loss or intentional misuse by the customer or authorized employees of the issuer, - privacy of non-PIN transaction data, - protection of transaction messages against alteration or substitution, e.g. an online authorization response, - protection against replay of the transaction, - functionality of devices used for PIN entry which is related to issuer functions other than PIN entry, - specific key management techniques, and - access to, and storage of, card data other than the PIN by applications such as wallets.
DS/ISO 9564-4 - FINANCIAL SERVICES - PERSONAL IDENTIFICATION NUMBER (PIN) MANAGEMENT AND SECURITY - PART 4: REQUIREMENTS FOR PIN HANDLING IN ECOMMERCE FOR PAYMENT TRANSACTIONS Organization: DS
Date: 2016-04-04
Description: ., - management of cardholder PINs for use as a means of cardholder verification in retail banking systems in, notably, automated teller machine (ATM) systems, point-of-sale (POS) terminals, automated fuel dispensers, vending machines, banking kiosks and PIN selection/change systems, which are covered in ISO 9564-1, - card proxies such as mobile phones or key fobs, - approved algorithms for PIN encipherment, which are covered in ISO 9564-2, - the protection of the PIN against loss or intentional misuse by the customer or authorized employees of the issuer, - privacy of non-PIN transaction data, - protection of transaction messages against alteration or substitution, e.g. an online authorization response, - protection against replay of the transaction, - functionality of devices used for PIN entry which is related to issuer functions other than PIN entry, - specific key management techniques, and - access to, and storage of, card data other than the PIN by applications such as wallets.

1 - 20 of 34 results