Systems and software engineering - Systems and software assurance - Part 3: System integrity levels
ISO/IEC 15026-3:2011 specifies the concept of integrity levels with corresponding integrity level requirements that are required to be met in order to show the achievement of the integrity level. It places requirements on and recommends methods for defining and using integrity levels and their integrity level requirements, including the assignment of integrity levels to systems, software products…
Information technology - Learning, education and training - Metadata for learning resources - Part 3...
The primary purpose of ISO/IEC 19788 is to specify metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of data elements and the specification of their attributes.
ISO/IEC 19788 provides data elements for the description of learning resources and resources directly related to learning resources.
ISO/IEC 19788-3:2011…
Information technology — Learning, education and training — Metadata for learning resources — Part 3...
The primary purpose of ISO/IEC 19788 is to specify metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of data elements and the specification of their attributes.
ISO/IEC 19788 provides data elements for the description of learning resources and resources directly related to learning resources.
ISO/IEC 19788-3:2011…
Information technology — Security techniques — Information security management systems — Overview an...
1 Scope
This International Standard provides:
a) an overview of the ISMS family of standards;
b) an introduction to information security management systems (ISMS);
c) a brief description of the Plan-Do-Check-Act (PDCA) process; and
d) terms and definitions for use in the ISMS family of standards.
This International Standard is applicable to all types of organization (e.g. commercial enterprises…
Information technology — Security techniques — Information security risk management
1 Scope
This International Standard provides guidelines for information security risk management.
This International Standard supports the general concepts specified in ISO/IEC 27001 and is designed to
assist the satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001…
Petroleum and natural gas industries — Specific requirements for offshore structures — Part 3: Topsi...
1 Scope
This part of ISO 19901 gives requirements for the design, fabrication, installation, modification and structural
integrity management for the topsides structure for an oil and gas platform. It complements ISO 19902,
ISO 19903, ISO 19904-1, ISO 19905-1 and ISO 19906, which give requirements for various forms of support
structure. Requirements in this part of ISO 19901 concerning…
Petroleum and natural gas industries — Specific requirements for offshore structures — Part 3: Topsi...
This part of ISO 19901 gives requirements for the design, fabrication, installation, modification and structural integrity management for the topsides structure for an oil and gas platform. It complements ISO 19902, ISO 19903, ISO 19904-1, ISO 19905-1 and ISO 19906, which give requirements for various forms of support structure. Requirements in this part of ISO 19901 concerning modifications and…
Information technology — Security techniques — Guidelines for auditors on information security contr...
ISO/IEC TR 27008:2011 provides guidance on reviewing the implementation and operation of controls, including technical compliance checking of information system controls, in compliance with an organization's established information security standards.
ISO/IEC TR 27008:2011 is applicable to all types and sizes of organizations, including public and private companies, government entities, and…
Information technology - Security techniques - Guidelines for auditors on information security contr...
ISO/IEC TR 27008:2011 provides guidance on reviewing the implementation and operation of controls, including technical compliance checking of information system controls, in compliance with an organization's established information security standards.
ISO/IEC TR 27008:2011 is applicable to all types and sizes of organizations, including public and private companies, government entities, and…
Information technology — JPSearch — Part 2: Registration, identification and management of schema an...
ISO/IEC 24800-2:2011 specifies a series of interfaces to allow disparate systems an interoperable management of image repositories. It also specifies the general rules which govern the usage of metadata in JPSearch and provides a specification which
provides rules for the representation of image metadata descriptions, consisting of the definition of the JPSearch Core Metadata Schema,
provides…