Information technology — Virtual keyboards user interfaces — Part 2: On-screen keyboards with direct...
This document specifies the design and specification of on-screen keyboards (keyboards that are displayed on a screen) with direct touch interface, including those with some audio feedback.
This document specifies keyboard layouts designed for on-screen keyboards with direct touch interface and ways for interaction with them.
It is not applicable to virtual keyboards that are not displayed on a…
Information technology - Virtual keyboards user interfaces - Part 2: On-screen keyboards with direct...
This document specifies the design and specification of on-screen keyboards (keyboards that are displayed on a screen) with direct touch interface, including those with some audio feedback.
This document specifies keyboard layouts designed for on-screen keyboards with direct touch interface and ways for interaction with them.
It is not applicable to virtual keyboards that are not displayed on a…
Stationary source emissions — Determination of greenhouse gas emissions in energy-intensive industri...
This document specifies a harmonized method for calculating the emissions of greenhouse gases from the electrolysis section of primary aluminium smelters and aluminium anode baking plants. This document also specifies key performance indicators for the purpose of benchmarking of aluminium and boundaries.
Stationary source emissions — Determination of greenhouse gas emissions in energy-intensive industri...
This document provides a harmonized methodology for calculating GHG emissions from the ferro-alloys industry based on the mass balance approach. This document also provides key performance indicators over time for ferro-alloys plants. This document covers the following direct and indirect sources of GHG:
— direct GHG emissions [see ISO 14064-1:2018, 5.2.4 a)] from sources that are owned or…
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
1 Scope
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.
This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts…
Information technology — DevOps — Building reliable and secure systems including application build, ...
1.1 Scope
This document provides requirements and guidance on the implementation of DevOps to define, control,
and improve software life cycle processes. It applies within an organization or a project to build, package,
and deploy software and systems in a secure and reliable way. This document specifies practices to
collaborate and communicate effectively in groups including development,…
Information technology — Automatic identification and data capture techniques — Part 11: Crypto suit...
This document defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 series of air interfaces standards for radio frequency identification (RFID) devices. This document provides a common crypto suite for security for RFID devices for air interface standards and application standards. The crypto suite is defined in alignment with existing air interfaces.
This document specifies basic…
Information technology - Automatic identification and data capture techniques - Part 11: Crypto suit...
This document defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 series of air interfaces standards for radio frequency identification (RFID) devices. This document provides a common crypto suite for security for RFID devices for air interface standards and application standards. The crypto suite is defined in alignment with existing air interfaces.
This document specifies basic…
This document describes the management of symmetric and asymmetric cryptographic keys that can be used to protect sensitive information in financial services related to retail payments. The document covers all aspects of retail financial services, including connections between a card-accepting device and an Acquirer, between an Acquirer and a card Issuer, and between an ICC and a card-accepting…
Information technology — Information security incident management — Part 1: Principles and process
This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing for, detecting, reporting, assessing, and responding to incidents, and applying lessons learned.
The guidance on the information security incident management process and its…