Add to Cart |
Document Number |
Document Title |
$185.00 |
ISO/IEC 10116:2006 |
Information technology - Security techniques - Modes of operation for an n-bit block cipher |
$68.00 |
ISO/IEC 10118-1:2016 |
Information technology - Security techniques - Hash-functions - Part 1: General |
$162.00 |
ISO/IEC 10118-2:2010 |
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher |
$232.00 |
ISO/IEC 10118-3:2004 |
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions |
$19.00 |
ISO/IEC 10118-3/Amd1:2006 |
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions - Amendment 1: Dedicated Hash-Function 8 (SHA-224) |
$138.00 |
ISO/IEC 10118-4:1998 |
Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic |
$19.00 |
ISO/IEC 10118-4:1998/Amd1:2014 |
- Amendment 1: Object identifiers |
$162.00 |
ISO/IEC 11770-1:2010 |
Information technology - Security techniques - Key management - Part 1: Framework |
$162.00 |
ISO/IEC 11770-2:2008 |
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques |
$232.00 |
ISO/IEC 11770-3:2015 |
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques |
$162.00 |
ISO/IEC 11770-4:2006 |
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets |
$138.00 |
ISO/IEC 11770-5:2011 |
Information technology - Security techniques - Key management - Part 5: Group key management |
$138.00 |
ISO/IEC 11770-6:2016 |
Information technology - Security techniques - Key management - Part 6: Key derivation |
$232.00 |
ISO/IEC 11889-1:2015 |
Information technology - Trusted Platform Module Library - Part 1: Architecture |
$232.00 |
ISO/IEC 11889-2:2015 |
Information technology - Trusted Platform Module Library - Part 2: Structures |
$232.00 |
ISO/IEC 11889-3:2015 |
Information technology - Trusted Platform Module Library - Part 3: Commands |
$232.00 |
ISO/IEC 11889-4:2015 |
Information technology - Trusted Platform Module Library - Part 4: Supporting Routines |
$138.00 |
ISO/IEC 13888-1:2009 |
Information technology - Security techniques - Non-repudiation - Part 1: General |
$103.00 |
ISO/IEC 13888-2:2010 |
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques |
$103.00 |
ISO/IEC 13888-3:2009 |
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques |
$162.00 |
ISO/IEC TR 14516:2002 |
Information technology - Security techniques - Guidelines for the use and management of Trusted Third Party services |
$68.00 |
ISO/IEC 14888-1:2008 |
Information technology - Security techniques - Digital signatures with appendix - Part 1: General |
$209.00 |
ISO/IEC 14888-2:2008 |
Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms |
$232.00 |
ISO/IEC 14888-3:2016 |
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms |
$209.00 |
ISO/IEC 15408-1:2009 |
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model |
$232.00 |
ISO/IEC 15408-2:2008 |
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components |
$232.00 |
ISO/IEC 15408-3:2008 |
Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components |
$209.00 |
ISO/IEC TR 15443-1:2012 |
Information technology - Security techniques - Security assurance framework - Part 1: Introduction and concepts |
$103.00 |
ISO/IEC TR 15443-2:2012 |
Information technology - Security techniques - Security assurance framework - Part 2: Analysis |
$232.00 |
ISO/IEC TR 15446:2009 |
Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets |
$138.00 |
ISO/IEC 15816:2002 |
Information technology - Security techniques - Security information objects for access control |
$209.00 |
ISO/IEC 15945:2002 |
Information technology - Security techniques - Specification of TTP services to support the application of digital signatures |
$162.00 |
ISO/IEC 15946-1:2016 |
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General |
$162.00 |
ISO/IEC 15946-5:2009 |
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation |
$185.00 |
ISO/IEC 17825:2016 |
Information technology - Security techniques - Testing methods for the mitigation of non-invasive attack classes against cryptographic modules |
$162.00 |
ISO/IEC 18014-1:2008 |
Information technology - Security techniques - Time-stamping services - Part 1: Framework |
$162.00 |
ISO/IEC 18014-2:2009 |
Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens |
$185.00 |
ISO/IEC 18014-3:2009 |
Information technology - Security techniques - Time-stamping services - Part 3: Mechanisms producing linked tokens |
$103.00 |
ISO/IEC 18014-4:2015 |
Information technology - Security techniques - Time-stamping services - Part 4: Traceability of time sources |
$232.00 |
ISO/IEC 18031:2011 |
Information technology - Security techniques - Random bit generation |
$103.00 |
ISO/IEC 18032:2005 |
Information technology - Security techniques - Prime number generation |
$103.00 |
ISO/IEC 18033-1:2015 |
Information technology - Security techniques - Encryption algorithms - Part 1: General |
$232.00 |
ISO/IEC 18033-2:2006 |
Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers |
$209.00 |
ISO/IEC 18033-3:2010 |
Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers |
$232.00 |
ISO/IEC 18033-4:2011 |
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers |
$185.00 |
ISO/IEC 18033-5:2015 |
Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers |
$232.00 |
ISO/IEC 18045:2008 |
Information technology - Security techniques - Methodology for IT security evaluation |
$209.00 |
ISO/IEC 18180:2013 |
Information technology - Specification for the Extensible Configuration Checklist Description Format (XCCDF) Version 1.2 |
$209.00 |
ISO/IEC 18367:2016 |
Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing |
$162.00 |
ISO/IEC 18370-1:2016 |
Information technology - Security techniques - Blind digital signatures - Part 1: General |
$209.00 |
ISO/IEC 18370-2:2016 |
Information technology - Security techniques - Blind digital signatures - Part 2: Discrete logarithm based mechanisms |
$68.00 |
ISO/IEC 19592-1:2016 |
Information technology - Security techniques - Secret sharing - Part 1: General |
$162.00 |
ISO/IEC 19772:2009 |
Information technology - Security techniques - Authenticated encryption |
$209.00 |
ISO/IEC 19790:2012 |
Information technology - Security techniques - Security requirements for cryptographic modules |
$232.00 |
ISO/IEC TR 19791:2010 |
Information technology - Security techniques - Security assessment of operational systems |
$185.00 |
ISO/IEC 19792:2009 |
Information technology - Security techniques - Security evaluation of biometrics |
$103.00 |
ISO/IEC TR 20004:2015 |
Information technology - Security techniques - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
$138.00 |
ISO/IEC 20008-1:2013 |
Information technology - Security techniques - Anonymous digital signatures - Part 1: General |
$232.00 |
ISO/IEC 20008-2:2013 |
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key |
$45.00 |
ISO/IEC 20009-1:2013 |
Information technology - Security techniques - Anonymous entity authentication - Part 1: General |
$209.00 |
ISO/IEC 20009-2:2013 |
Information technology - Security techniques - Anonymous entity authentication - Part 2: Mechanisms based on signatures using a group public key |
$68.00 |
ISO/IEC 20648:2016 |
Information technology - TLS specification for storage systems |
$232.00 |
ISO/IEC 21827:2008 |
Information technology - Security techniques - Systems Security Engineering - Capability Maturity Modelr (SSE-CMMr) |
$185.00 |
ISO/IEC 24745:2011 |
Information technology - Security techniques - Biometric information protection |
$232.00 |
ISO/IEC 24759:2014 |
Information technology - Security techniques - Test requirements for cryptographic modules |
$138.00 |
ISO/IEC 24760-1:2011 |
Information technology - Security techniques - A framework for identity management - Part 1: Terminology and concepts |
$185.00 |
ISO/IEC 24760-2:2015 |
Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements |
$162.00 |
ISO/IEC 24760-3:2016 |
Information technology - Security techniques - A framework for identity management - Part 3: Practice |
$185.00 |
ISO/IEC 24761:2009 |
Information technology - Security techniques - Authentication context for biometrics |
$138.00 |
ISO/IEC 27018:2014 |
Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
$138.00 |
ISO/IEC TR 27023:2015 |
Information technology - Security techniques - Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002 |
$185.00 |
ISO/IEC 27031:2011 |
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity |
$185.00 |
ISO/IEC 27032:2012 |
Information technology - Security techniques - Guidelines for cybersecurity |
$185.00 |
ISO/IEC 27033-1:2015 |
Information technology - Security techniques - Network security - Part 1: Overview and concepts |
$162.00 |
ISO/IEC 27033-2:2012 |
Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security |
$162.00 |
ISO/IEC 27033-3:2010 |
Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues |
$138.00 |
ISO/IEC 27033-4:2014 |
Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways |
$103.00 |
ISO/IEC 27033-5:2013 |
Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Networks (VPNs) |
$138.00 |
ISO/IEC 27033-6:2016 |
Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access |
$209.00 |
ISO/IEC 27034-1:2011 |
Information technology - Security techniques - Application security - Part 1: Overview and concepts |
$209.00 |
ISO/IEC 27034-2:2015 |
Information technology - Security techniques - Application security - Part 2: Organization normative framework |
$209.00 |
ISO/IEC 27034-6:2016 |
Information technology - Security techniques - Application security - Part 6: Case studies |
$138.00 |
ISO/IEC 27035-1:2016 |
Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management |
$209.00 |
ISO/IEC 27035-2:2016 |
Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response |
$103.00 |
ISO/IEC 27036-1:2014 |
Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and concepts |
$185.00 |
ISO/IEC 27036-2:2014 |
Information technology - Security techniques - Information security for supplier relationships - Part 2: Requirements |
$185.00 |
ISO/IEC 27036-3:2013 |
Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security |
$138.00 |
ISO/IEC 27036-4:2016 |
Information technology - Security techniques - Information security for supplier relationships - Part 4: Guidelines for security of cloud services |
$185.00 |
ISO/IEC 27037:2012 |
Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence |
$68.00 |
ISO/IEC 27038:2014 |
Information technology - Security techniques - Specification for digital redaction |
$185.00 |
ISO/IEC 27039:2015 |
Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems (IDPS) |
$232.00 |
ISO/IEC 27040:2015 |
Information technology - Security techniques - Storage security |
$103.00 |
ISO/IEC 27041:2015 |
Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method |
$103.00 |
ISO/IEC 27042:2015 |
Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence |
$162.00 |
ISO/IEC 27043:2015 |
Information technology - Security techniques - Incident investigation principles and processes |
$138.00 |
ISO/IEC 27050-1:2016 |
Information technology - Security techniques - Electronic discovery - Part 1: Overview and concepts |
$138.00 |
ISO/IEC 29100:2011 |
Information technology - Security techniques - Privacy framework |
$185.00 |
ISO/IEC 29101:2013 |
Information technology - Security techniques - Privacy architecture framework |
$185.00 |
ISO/IEC 29115:2013 |
Information technology - Security techniques - Entity authentication assurance framework |
$185.00 |
ISO/IEC 29128:2011 |
Information technology - Security techniques - Verification of cryptographic protocols |
$162.00 |
ISO/IEC 29146:2016 |
Information technology - Security techniques - A framework for access management |
$162.00 |
ISO/IEC 29147:2014 |
Information technology - Security techniques - Vulnerability disclosure |
$138.00 |
ISO/IEC TR 29149:2012 |
Information technology - Security techniques - Best practices for the provision and use of time-stamping services |
$209.00 |
ISO/IEC 29150:2011 |
Information technology - Security techniques - Signcryption |
$103.00 |
ISO/IEC 29190:2015 |
Information technology - Security techniques - Privacy capability assessment model |
$68.00 |
ISO/IEC 29191:2012 |
Information technology - Security techniques - Requirements for partially anonymous, partially unlinkable authentication. |
$103.00 |
ISO/IEC 29192-1:2012 |
Information technology - Security techniques - Lightweight cryptography - Part 1: General |
$185.00 |
ISO/IEC 29192-2:2012 |
Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers |
$138.00 |
ISO/IEC 29192-3:2012 |
Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers |
$138.00 |
ISO/IEC 29192-4:2013 |
Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
$19.00 |
ISO/IEC 29192-4:2013/Amd1:2016 |
- Amendment 1 |
$138.00 |
ISO/IEC 29192-5:2016 |
Information technology - Security techniques - Lightweight cryptography - Part 5: Hash-functions |
$162.00 |
ISO/IEC TS 30104:2015 |
Information Technology - Security Techniques - Physical Security Attacks, Mitigation Techniques and Security Requirements |
$68.00 |
ISO/IEC 30111:2013 |
Information technology - Security techniques - Vulnerability handling processes |
$103.00 |
ISO/IEC 7064:2003 |
Information technology - Security techniques - Check character systems |
$209.00 |
ISO/IEC 9796-2:2010 |
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2: Integer factorization based mechanisms |
$209.00 |
ISO/IEC 9796-3:2006 |
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms |
$185.00 |
ISO/IEC 9797-1:2011 |
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher |
$185.00 |
ISO/IEC 9797-2:2011 |
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function |
$138.00 |
ISO/IEC 9797-3:2011 |
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function |
$68.00 |
ISO/IEC 9798-1:2010 |
Information technology - Security techniques - Entity authentication - Part 1: General |
$103.00 |
ISO/IEC 9798-2:2008 |
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms |
$45.00 |
ISO/IEC 9798-3:1998 |
Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques |
$19.00 |
ISO/IEC 9798-3/Amd1:2010 |
Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a public key algorithm - Amendment 1: . |
$68.00 |
ISO/IEC 9798-4:1999 |
Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function |
$209.00 |
ISO/IEC 9798-5:2009 |
Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques |
$162.00 |
ISO/IEC 9798-6:2010 |
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer |
$103.00 |
IWA 17:2014 |
Information and operations security and integrity requirements for lottery and gaming organizations |
$185.00 |
ISO/IEC 10116:2017 |
Information technology - Security techniques - Modes of operation for an n-bit block cipher |
$162.00 |
ISO/IEC 15946-5:2017 |
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation |
$138.00 |
ISO/IEC 18031:2011/Amd1:2017 |
- Amendment 1: Deterministic random bit generation |
$138.00 |
ISO/IEC 20009-4:2017 |
Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets |
$232.00 |
ISO/IEC 24759:2017 |
Information technology - Security techniques - Test requirements for cryptographic modules |
$185.00 |
ISO/IEC 29134:2017 |
Information technology - Security techniques - Guidelines for privacy impact assessment |
$185.00 |
ISO/IEC 29151:2017 |
Information technology - Security techniques - Code of practice for personally identifiable information protection |
$103.00 |
ISO/IEC 17922:2017 |
Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module |
$209.00 |
ISO/IEC TR 15446:2017 |
Information technology - Security techniques - Guidance for the production of protection profiles and security targets |
$162.00 |
ISO/IEC 27034-5:2017 |
Information technology - Security techniques - Application security - Part 5: Protocols and application security controls data structure |
$138.00 |
ISO/IEC 19592-2:2017 |
Information technology - Security techniques - Secret sharing - Part 2: Fundamental mechanisms |
$138.00 |
ISO/IEC TS 19249:2017 |
Information technology - Security techniques - Catalogue of architectural and design principles for secure products, systems and applications |
$19.00 |
ISO/IEC 11770-3:2015/Amd1:2017 |
- Amendment 1: Blinded Diffie-Hellman key agreement |
$185.00 |
ISO/IEC 11770-4:2017 |
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets |
$19.00 |
ISO/IEC 18033-2:2006/Amd1:2017 |
- Amendment 1: FACE |
$138.00 |
ISO/IEC 19823-10:2017 |
Information technology - Conformance test methods for security service crypto suites - Part 10: Crypto suite AES-128 |
$162.00 |
ISO/IEC 27050-3:2017 |
Information technology - Security techniques - Electronic discovery - Part 3: Code of practice for electronic discovery |
$162.00 |
ISO/IEC 20243:2015 |
Information Technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Mitigating maliciously tainted and counterfeit products |
$138.00 |
ISO/IEC 27001:2013 |
Information technology - Security techniques - Information security management systems - Requirements |
$209.00 |
ISO/IEC 27002:2013 |
Information technology Security techniques Code of practice for information security controls |
$209.00 |
ISO/IEC 27003:2010 |
Information technology - Security techniques - Information security management system implementation guidance |
$209.00 |
ISO/IEC 27004:2016 |
Information technology - Security techniques - Information security management - Monitoring, measurement, analysis and evaluation |
$240.00 |
ISO/IEC 27004:2009 |
Information technology - Security techniques - Information security management - Measurement |
$209.00 |
ISO/IEC 27005:2011 |
Information technology - Security techniques - Information security risk management |
$162.00 |
ISO/IEC 27006:2015 |
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems |
$162.00 |
ISO/IEC 27007:2011 |
Information technology - Security techniques - Guidelines for information security management systems auditing |
$185.00 |
ISO/IEC TR 27008:2011 |
Information technology - Security techniques - Guidelines for auditors on information security controls |
$162.00 |
ISO/IEC 27010:2015 |
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications |
$162.00 |
ISO/IEC 27011:2016 |
Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
$200.00 |
ISO/IEC 27011:2008 |
Information technology - Security techniques - Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 |
$68.00 |
ISO/IEC 27014:2013 |
Information technology - Security techniques - Governance of information security |
$162.00 |
ISO/IEC TR 27016:2014 |
Information technology - Security techniques - Information security management - Organizational economics |
$162.00 |
ISO/IEC 27017:2015 |
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services |
$185.00 |
ISO/IEC TR 27019:2013 |
Information technology - Security techniques - Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry |
$185.00 |
ISO/IEC 27003:2017 |
Information technology - Security techniques - Information security management systems - Guidance |
$185.00 |
ISO/IEC 27007:2017 |
Information technology - Security techniques - Guidelines for information security management systems auditing |
$162.00 |
ISO/IEC 27019:2017 |
Information technology - Security techniques - Information security controls for the energy utility industry |
$138.00 |
ISO/IEC 27021:2017 |
Information technology - Security techniques - Competence requirements for information security management systems professionals |
$162.00 |
ISO/IEC 27000:2016 |
Information technology - Security techniques - Information security management systems - Overview and vocabulary |
$68.00 |
ISO/IEC 27009:2016 |
Information technology - Security techniques - Sector-specific application of ISO/IEC 27001 - Requirements |
$103.00 |
ISO/IEC TR 27015:2012 |
Information technology - Security techniques - Information security management guidelines for financial services |