Standard Guide for Cybersecurity and Cyberattack Mitigation
This product is not for sale, please contact us for more information
SAPIENT Network of autonomous sensors and effectors. Interface control document. Specification
Standard Guide for Inclusion of Cyber Risks into Maritime Safety Management Systems in Accordance with IMO Resolution MSC.428(98)―Cyber Risks and Challenges
€72.00
Manufacturing. Establishing and implementing a security-minded approach. Specification
Information technology. Security techniques. Time-stamping services Mechanisms producing independent tokens
€316.00
Information technology. Security techniques. Biometric information protection
€374.00
Technologies de l'information. Techniques de securite. Code de bonne practique pour la gestion de la securite de l'information (French translation of BS ISO/IEC 17799:2005)
€269.00
Information technology. Security techniques. Sector-specific application of ISO/IEC 27001. Requirements
€193.00
Security for industrial automation and control systems Patch management in the IACS environment
Information technology. Security techniques. Time-stamping services Traceability of time sources
Information technology. Security techniques. Electronic discovery Overview and concepts
Information technology. Security techniques. Lightweight cryptography Mechanisms using asymmetric techniques
Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets
Information technology. Security techniques. assurance framework Introduction and concepts
Information technology. Security techniques. assurance framework Analysis