Search
Drupal Primary tabs
You may search by ICS code, document number, title, or keyword.
Search results
Showing items 1 through 10 of 3161.
-
CSA ISO/IEC 15408-1:23
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general modelstandards (not verified)
-
CSA ISO/IEC 15408-2:23
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional componentsstandards (not verified)
-
CSA ISO/IEC 15408-3:23
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance componentsstandards (not verified)
-
CSA ISO/IEC 15408-4:23
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activitiesstandards (not verified)
-
CSA ISO/IEC 15408-5:23
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirementsstandards (not verified)
-
CSA ISO/IEC 18045:23
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluationstandards (not verified)
-
CSA ISO/IEC 19075-9:23
Information technology — Guidance for the use of database language SQL — Part 9: Online analytic processing (OLAP) capabilities (Guide/OLAP)standards (not verified)
-
CSA ISO/IEC 20009-3:23
Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signaturesstandards (not verified)
-
CSA ISO/IEC 22989:23
Information technology — Artificial intelligence — Artificial intelligence concepts and terminologystandards (not verified)
-
CSA ISO/IEC/IEEE 32675:23
Information technology — DevOps — Building reliable and secure systems including application build, package and deploymentstandards (not verified)