ISO/IEC 24727-6:2010 defines the procedures for
registration of authentication protocols (APs), including related cryptographic algorithms, test methods and conformance assessment criteria, and
registration of the adoption of ISO/IEC 24727 APs by parties desiring to advertise AP interoperability.
Information technology - Portable Operating System Interface (POSIX®) Base Specifications, Issue 7
Preface
Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body…
Information technology — Security techniques — Network security — Part 1: Overview and concepts
1 Scope
This part of ISO/IEC 27033 provides an overview of network security and related definitions. It defines and
describes the concepts associated with, and provides management guidance on, network security. (Network
security applies to the security of devices, security of management activities related to the devices,
applications/services, and end-users, in addition to security of the…
Information technology — Programming languages, their environments and system software interfaces — ...
ISO/IEC TR 24731 provides alternative functions for the C library that promote safer, more secure programming. ISO/IEC TR 24731-1 provides simple replacement functions for the library functions of ISO/IEC 9899:1999 that provide bounds checking. Those functions can be used as simple replacements for the original library functions in legacy code. ISO/IEC TR 24731-2:2010 presents replacements for…
Information technology - Programming languages, their environments and system software interfaces - ...
ISO/IEC TR 24731 provides alternative functions for the C library that promote safer, more secure programming. ISO/IEC TR 24731-1 provides simple replacement functions for the library functions of ISO/IEC 9899:1999 that provide bounds checking. Those functions can be used as simple replacements for the original library functions in legacy code. ISO/IEC TR 24731-2:2010 presents replacements for…
Industrial communication networks - Network and system security - Part 2-1: Establishing an industri...
IEC 62443-2-1:2010 defines the elements necessary to establish a cyber security management system (CSMS) for industrial automation and control systems (IACS) and provides guidance on how to develop those elements. This standard uses the broad definition and scope of what constitutes an IACS described in IEC/TS 62443-1-1. The elements of a CSMS described in this standard are mostly policy,…
Industrial communication networks - Network and system security - Part 2-1: Establishing an industri...
IEC 62443-2-1:2010 defines the elements necessary to establish a cyber security management system (CSMS) for industrial automation and control systems (IACS) and provides guidance on how to develop those elements. This standard uses the broad definition and scope of what constitutes an IACS described in IEC/TS 62443-1-1. The elements of a CSMS described in this standard are mostly policy,…
The ISO 15189:2007 essentials - A practical handbook for implementing the ISO 15189:2007 standard fo...
Preface
This is the second edition of CSA PLUS 15189, The ISO 15189:2007 essentials - A practical handbook for implementing the ISO 15189:2007 Standard for medical laboratories. It supersedes the previous edition, published in 2004 under the title The ISO 15189:2003 essentials - A practical handbook for implementing
the ISO 15189:2003 Standard for medical laboratories.
Introduction…
Hydraulic machines - Acceptance tests of small hydroelectric installations
IEC 62006:2010 defines the test, the measuring methods and the contractual guarantee conditions for field acceptance tests of the generating machinery in small hydroelectric power installations. It applies to installations containing impulse or reaction turbines with unit power up to about 15 MW and reference diameter of about 3 m. The driven generator can be of synchronous or asynchronous type.…
Fire hazard testing - Part 2-12: Glowing/hot-wire based test methods - Glow-wire flammability index ...
IEC 60695-2-12:2010 specifies the details of the glow-wire test to be applied to test specimens of solid electrical insulating materials or other solid materials for flammability testing to determine the glow-wire flammability index (GWFI). GWFI is the highest temperature, determined during this standardized procedure, at which the tested material; does not ignite or, if it does, extinguishes…