Search results

Search list

Results in:

51-60 of 93 results

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model

Information technology - Big data security and privacy - Guidelines for managing big data risks

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components

Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model

TOP