loading
JIS INFORMATION SECURITY - JIS Information Security/LAN/Bar Code/RFID Handbook
January 1, 2019 - JSA
A description is not available for this item.
DS/ISO/IEC 27014 - Information security, cybersecurity and privacy protection – Governance of information security
December 21, 2020 - DS

This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended...

ISO/IEC 27014 - Information security, cybersecurity and privacy protection — Governance of information security
December 1, 2020 - ISO

This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization. The intended...

Information Security and Optimization
November 19, 2020 - CRC

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are...

DS/ISO/IEC 19772 - Information security – Authenticated encryption
November 30, 2020 - DS

This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: - data confidentiality, i.e. protection against unauthorized disclosure of data; - data integrity, i.e. protection that enables the...

ISO/IEC 19772 - Information security — Authenticated encryption
November 1, 2020 - ISO

This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: - data confidentiality, i.e. protection against unauthorized disclosure of data; - data integrity, i.e. protection that enables the...

BS ISO/IEC 19772 - Information security — Authenticated encryption
December 31, 2020 - BSI
A description is not available for this item.
RTCA DO-355 - Information Security Guidance for Continued Airworthiness
September 10, 2020 - RTCA

ED-202A / DO-326A and ED-203A / DO-356A provide guidance in addressing airworthiness security during the aircraft product life cycle from project initiation until the aircraft Type Certificate (Amended Type Certificate, Supplemental Type Certificate and Amended Supplemental Type Certificate)...

EUROCAE ED 204 - INFORMATION SECURITY GUIDANCE FOR CONTINUING AIRWORTHINESS
September 1, 2020 - EUROCAE

ED-202A / DO-326A and ED-203A / DO-356A provide guidance in addressing airworthiness security during the aircraft product life cycle from project initiation until the aircraft Type Certificate (Amended Type Certificate, Supplemental Type Certificate and Amended Supplemental Type Certificate)...

ITU-T X.1052 - Information security management processes for telecommunication organizations
October 1, 2020 - ITU-T

This Recommendation provides information security management processes for telecommunication organizations to support the implementation of [ITU-T X.1051]. This Recommendation is based on a process approach to describe a set of security management areas which give guidelines to...

Information Security Handbook
December 8, 2017 - PACKT

Implement information security effectively as per your organization's needs. About This Book • Learn to build your own information security framework, the best fit for your organization • Build on the concepts of threat modeling, incidence response, and security...

BS ISO/IEC 18032 - Information security — Prime number generation
December 31, 2020 - BSI
A description is not available for this item.
DS/ISO/IEC 18032 - Information security – Prime number generation
December 7, 2020 - DS

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups: -...

ISO/IEC 18032 - Information security — Prime number generation
December 1, 2020 - ISO

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups: -...

NR/L2/INF/02242 - Information Security Manual
December 3, 2016 - NR

This manual describes the framework for governance management and of security requirements for information and information systems. This manual provides the baseline security principals to support the level 1 Information Security Policy. This applies to all...

DS/ISO/IEC 27007 - Information security, cybersecurity and privacy protection – Guidelines for information security management systems auditing
January 28, 2020 - DS

This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011. This document is applicable to those needing to understand or...

ISO/IEC 27007 - Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
January 1, 2020 - ISO

This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011. This document is applicable to those needing to understand or...

CSA ISO/IEC 27007 - Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
January 1, 2020 - CSA

This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011. This document is applicable to those needing to understand or...

Advertisement