Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 3161 - 3170 de 32375
Matériel forestier — Exigences de sécurité et essais pour les perches élagueuses à moteur — Partie 2...
Le présent document spécifie les exigences de sécurité, et les mesures pour leur vérification, pour la conception et la construction des perches élagueuses portatives à moteur, équipées d'une source motrice portée à dos et fonctionnant avec un arbre de transmission pour alimenter le dispositif de coupe consistant en une chaîne de scie, lame de scie alternative ou lame de scie circulaire…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2021-10-21
Code(s) de l'ICS :
65.060.80
Matériel forestier — Exigences de sécurité et essais pour les perches élagueuses à moteur — Partie 1...
Le présent document spécifie les exigences de sécurité, et les mesures pour leur vérification, pour la conception et la construction des perches élagueuses portatives à moteur (ci-après appelées «machines») y compris des machines en extension et les machines télescopiques équipées d'un moteur à combustion interne intégré comme source motrice. Ces machines utilisent un arbre de transmission…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2021-10-21
Code(s) de l'ICS :
65.060.80
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2021-10-21
Code(s) de l'ICS :
35.030
Information technology — Coded representation of immersive media — Part 17: Reference software and c...
This document specifies the conformance and reference software for omnidirectional media format (specified in ISO/IEC 23090‑2). This document describes the reference software modules and the features that is supports. It also provides a description of how the reference software can be utilized. In addition, the document lists and describes test vectors comprising ISO base media file format files…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2021-10-21
Code(s) de l'ICS :
35.040.40
Information technology - Coded representation of immersive media - Part 17: Reference software and c...
This document specifies the conformance and reference software for omnidirectional media format (specified in ISO/IEC 23090‑2). This document describes the reference software modules and the features that is supports. It also provides a description of how the reference software can be utilized. In addition, the document lists and describes test vectors comprising ISO base media file format files…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2021-10-21
Code(s) de l'ICS :
35.040.40
Information security - Key management - Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2021-10-21
Code(s) de l'ICS :
35.030
Information technology — IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle proce...
This document provides guidance on risk management practices for the IT enabled services-business process outsourcing (ITES-BPO) service provider for the outsourced business processes. It provides guidance for planning, establishing, implementing, operating, monitoring, reviewing, maintaining and improving the risk management framework for the ITES-BPO services. This document: —    covers IT…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2021-10-19
Code(s) de l'ICS :
35.020
Information technology - IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle proce...
This document provides guidance on risk management practices for the IT enabled services-business process outsourcing (ITES-BPO) service provider for the outsourced business processes. It provides guidance for planning, establishing, implementing, operating, monitoring, reviewing, maintaining and improving the risk management framework for the ITES-BPO services. This document: — covers IT…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2021-10-19
Code(s) de l'ICS :
35.020
Information technology - Coding-independent code points - Part 2: Video
This document defines various code points and fields that establish properties of a video (or still image) representation and are independent of the compression encoding and bit rate. These properties can describe the appropriate interpretation of decoded data or can, similarly, describe the characteristics of such a signal before the signal is compressed by an encoder that is suitable for…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2021-10-18
Code(s) de l'ICS :
35.040.40
Information technology — Coding-independent code points — Part 2: Video
This document defines various code points and fields that establish properties of a video (or still image) representation and are independent of the compression encoding and bit rate. These properties can describe the appropriate interpretation of decoded data or can, similarly, describe the characteristics of such a signal before the signal is compressed by an encoder that is suitable for…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2021-10-18
Code(s) de l'ICS :
35.040.40