Information technology — Security techniques — Storage security
ISO/IEC 27040:2015 provides detailed technical guidance on how organizations can define an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection (security) of information where it is stored and to the security of the information being…
Information technology - Security techniques - Storage security
ISO/IEC 27040:2015 provides detailed technical guidance on how organizations can define an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection (security) of information where it is stored and to the security of the information being…
Periodic inspection of CANDU nuclear power plant balance of plant systems and components
1.1
This Standard defines requirements for the periodic inspection of balance of plant pressure retaining
systems, components, and supports that form part of a CANDU nuclear power plant using a risk
informed in-service inspection (RI-ISI) methodology. Periodic inspection (see Annex A for additional
guidance) is considered to include the fluid boundary portions of balance of plant systems,…
Technical requirements for in-service evaluation of zirconium alloy pressure tubes in CANDU reactors
1.1
This Standard specifies the technical requirements for the owner/operator to ensure structural integrity
of cold-worked Zr-2.5 wt% Nb alloy pressure tubes in operating CANDU reactors. Clause 13 of CSA
N285.0/N285.6 Series requires that when in-service inspection results or material surveillance results do
not satisfy the requirements of the original inspection program, a fitness-for-…
1.1
This Standard applies to Class 1, 2, 3, 4, 5, and 7 powered lift trucks—their design, operation, and maintenance. In addition, certain clauses apply to Class 6 vehicles, non-powered high-lift trucks, and personnel and burden carriers. See Annex B for a listing and description of classes.
1.2
The purpose of this Standard is to promote lift truck safety and minimize the risk of injury to…
Information technology — Sharable Content Object Reference Model (SCORM®) 2004 3rd Edition — Part 3:...
There are several key concepts that are introduced in the SCORM RTE book. The book
covers the essential LMS responsibilities for sequencing content objects (SCOs or
Assets) during run-time and allowing SCOs to indicate navigation requests. In addition,
guidance is offered for providing navigation controls to learners. General subjects
discussed include:
• RTE Management: Launching of content…
Information technology — Programming languages — Guidance to
avoiding vulnerabilities in programming...
This Technical Report specifies software programming language vulnerabilities to be avoided in the development
of systems where assured behaviour is required for security, safety, mission-critical and business-critical software.
In general, this guidance is applicable to the software developed, reviewed, or maintained for any application.
Vulnerabilities are described in a generic manner that is…
Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope
The modelling of a business transaction through scenarios and scenario components is done by specifying
the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic
classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G).
ISO/IEC 15944-4 focuses on internal constraints with a…
Information technology — Generic coding of moving pictures and associated audio information: Systems...
This Recommendation | International Standard specifies the system layer of the coding. It was developed principally to
support the combination of the video and audio coding methods defined in Parts 2 and 3 of ISO/IEC 13818. The system
layer supports six basic functions:
1) the synchronization of multiple compressed streams on decoding;
2) the interleaving of multiple compressed streams into a…
Information technology — Programming languages — Ada (ISO/IEC 8652:2012, IDT)
This International Standard specifies the form and meaning of programs written in Ada. Its purpose is
to promote the portability of Ada programs to a variety of computing systems.
Ada is a programming language designed to support the construction of long-lived, highly reliable
software systems. The language includes facilities to define packages of related types, objects, and
operations. The…