Information technology — Programming languages, their environments and system software interfaces — ...
This International Standard specifies a language-neutral and environment-neutral description to define the methodology needed to support the signing of software source code, to enable it to be uniquely identified, and to enable roll-back to signed previous versions. It is intended to be used by originators of software source code and the recipients of their signed source code. This International…
Information technology - Programming languages, their environments and system software interfaces - ...
This International Standard specifies a language-neutral and environment-neutral description to define the methodology needed to support the signing of software source code, to enable it to be uniquely identified, and to enable roll-back to signed previous versions. It is intended to be used by originators of software source code and the recipients of their signed source code. This International…
Technical Specification for C++ Extensions for Transactional Memory
ISO/IEC TS 19841:2015 describes extensions to the C++ Programming Language (1.3) that enable the specification of Transactional Memory. These extensions include new syntactic forms and modifications to existing language and library.
The International Standard, ISO/IEC 14882, provides important context and specification for this Technical Specification. This document is written as a set of changes…
Technical Specification for C++ Extensions for Transactional Memory
ISO/IEC TS 19841:2015 describes extensions to the C++ Programming Language (1.3) that enable the specification of Transactional Memory. These extensions include new syntactic forms and modifications to existing language and library.
The International Standard, ISO/IEC 14882, provides important context and specification for this Technical Specification. This document is written as a set of changes…
Universal serial bus interfaces for data and power - Part 2-1: Universal Serial Bus Specification, R...
IEC 62680-2-1:2015 defines an industry-standard USB. The specification describes the bus attributes, the protocol definition, types of transactions, bus management, and the programming interface required to design and build systems and peripherals that are compliant with this standard. The goal is to enable such devices from different vendors to interoperate in an open architecture. The…
Universal serial bus interfaces for data and power - Part 2-1: Universal Serial Bus Specification, R...
IEC 62680-2-1:2015 defines an industry-standard USB. The specification describes the bus attributes, the protocol definition, types of transactions, bus management, and the programming interface required to design and build systems and peripherals that are compliant with this standard. The goal is to enable such devices from different vendors to interoperate in an open architecture. The…
Estimation of sediment deposition in reservoirs using one dimensional simulation models
ISO/TR 11651:2015 describes a method for estimation/prediction of sediment deposition within and upstream of a reservoir using numerical simulation techniques through one-dimensional flow and sediment transport equations.
Numerical simulation models for predicting sediment distribution are applicable for reservoirs, where the length of the reservoir greatly exceeds the depth and width and the…
Information technology — Security techniques — Network security — Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…
Information technology - Security techniques - Network security - Part 1: Overview and concepts
ISO/IEC 27033-1:2015 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being…