Information technology - Automatic identification and data capture techniques - Part 1: Security ser...
ISO/IEC 29167-1:2014 defines the architecture for security services for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common technical specification for optional security services for RFID devices that may be used by ISO committees developing RFID application standards.
ISO/IEC 29167-1:2014 defines various security…
Information technology — Automatic identification and data capture techniques — Part 1: Security ser...
ISO/IEC 29167-1:2014 defines the architecture for security services for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common technical specification for optional security services for RFID devices that may be used by ISO committees developing RFID application standards.
ISO/IEC 29167-1:2014 defines various security…
Ergonomie — Conception accessible — Niveaux de pression acoustique des annonces vocales pour les pro...
L'ISO 24504:2014 spécifie des méthodes permettant de déterminer une plage appropriée de niveaux de pression acoustique pour les annonces vocales dans des environnements où le bruit ambiant est inférieur à 80 dB. Les méthodes spécifiées suivent les concepts de l'Guide ISO/IEC 71 et tiennent compte des personnes âgées ayant une capacité auditive diminuée pour déterminer les niveaux de…
Information technology - Telecommunications and information exchange between systems - MAC/PHY stand...
ISO/IEC 24771:2014 defines a protocol for the physical layer (PHY) and the data link layer in order to construct a reliable and high-speed data transmission network between devices on industrial sites such as factories and plants. This network specification provides a standardized protocol to provide a framework for various industrial devices to establish a simple, low-cost, energy-efficient, and…
Information technology — Telecommunications and information exchange between systems — MAC/PHY stand...
ISO/IEC 24771:2014 defines a protocol for the physical layer (PHY) and the data link layer in order to construct a reliable and high-speed data transmission network between devices on industrial sites such as factories and plants. This network specification provides a standardized protocol to provide a framework for various industrial devices to establish a simple, low-cost, energy-efficient, and…
Shielded power cable for commercial and industrial applications, 5–46 kV
1 Scope
1.1
This Standard applies to the materials, construction, and testing of one- to four-conductor cross-linked
polyethylene and ethylene propylene rubber-insulated shielded power cables, rated 5–46 kV, that are
used for the distribution of electrical energy under normal conditions of installation and service in indoor,
outdoor, aerial, underground, or underwater locations.
1.2
This…
Information technology — Security techniques — Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Information technology - Security techniques - Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Information technology — Security techniques — Information security for supplier relationships — Par...
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process…
Information technology - Security techniques - Information security for supplier relationships - Par...
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process…