1 Domaine d’application
1.1 Inclusions
1.1.1
Cette norme s’applique aux appareils et les systèmes clé en main autonomes
a)
fabriqués après la date de publication de cette norme; et
b)
les appareils qui utilisent des combustibles gazeux ou liquides.
1.1.2
Cette norme spécifie les exigences et les méthodes d’essai pour les dispositifs suivants dans le domaine des technologies de…
Evaluation of software development and cybersecurity programs
1 Scope
1.1
This Standard describes a methodology for assessing the product software and cybersecurity control maturity of an organization.
This Standard provides the evaluators and vendors a method to determine the control maturity of the organization and products/solutions being developed regardless of solution vertical. It covers the entire product system life cycle from conception to full…
Design, manufacture and use of intermediate bulk containers for the transportation of dangerous good...
1.1 Organization and content
This standard sets out requirements for designing, manufacturing and marking of Intermediate Bulk Containers
(IBCs) and for selecting and using means of containment for the transportation of dangerous goods of Classes 3,
4, 5, 6.1, 8 and 9. This standard consists of two parts and five annexes.
Part I contains the requirements for the design, manufacture and…
Conception, fabrication et utilisation de grands récipients pour vrac destinés au transport des marc...
1.1 Organisation et contenu
La présente norme énonce les exigences concernant la conception, la fabrication, et le marquage des grands
récipients pour vrac (GRV) ainsi que leur sélection et leur utilisation pour le transport des marchandises dangereuses
des classes 3, 4, 5, 6.1, 8 et 9. Elle comporte deux parties et cinq annexes.
La partie I énonce les exigences concernant la conception, la…
1 Scope
1.1 This Part is intended to be read together with the Standard for Low-Voltage Fuses – Part 1: General
Requirements, hereafter referred to as Part 1. The titles of the Clauses in this Part correspond to the
similarly titled Clauses in Part 1. The requirements of Part 1 apply unless modified by this Part. For the
Part 1 requirements, refer to the Standard for Low-Voltage Fuses – Part…
Management environnemental — Évaluation de la performance environnementale — Lignes directrices
1 Domaine d’application
Le présent document donne des lignes directrices relatives à la conception et l’utilisation de l’évaluation de la performance environnementale (EPE) au sein d’un organisme. Il est applicable à tout organisme, indépendamment de sa catégorie, sa taille, sa situation géographique et sa complexité.
Le présent document ne définit pas de niveaux de performance environnementale…
1 Scope
This document gives guidelines for the design and use of environmental performance evaluation (EPE) within an organization. It is applicable to all organizations, regardless of type, size, location and complexity.
This document does not establish environmental performance levels. It is not intended for use for the establishment of any other environmental management system (EMS)…
Information technology — Abstract Syntax Notation One (ASN.1) — Part 1: Specification of basic notat...
1 Scope
This Recommendation | International Standard provides a standard notation called Abstract Syntax Notation One
(ASN.1) that is used for the definition of data types, values, and constraints on data types.
This Recommendation | International Standard:
– defines a number of simple types, with their tags, and specifies a notation for referencing these types and
for specifying values of…
Information technology — Abstract Syntax Notation One (ASN.1) — Part 2: Information object specifica...
1 Scope
This Recommendation | International Standard is part of Abstract Syntax Notation One (ASN.1) and provides notation for specifying information object classes, information objects and information object sets.
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated ha...
1 Scope
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181-6.