微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

Defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810. Each test method is cross-referenced to one or more base standards, which can be ISO/IEC 7810 or one or more of the supplementary standards that define the information storage technologies employed in identification card applications.

定价: 1211元 / 折扣价: 1030 加购物车

在线阅读 收 藏

Specifies the characteristics of the fields to be provided for power and bi-directional communication between proximity coupling devices (PCDs) and proximity cards or objects (PICCs). It does not specify the means of generating coupling fields, nor the means of compliance with electromagnetic radiation and human exposure regulations, which can vary according to country.

定价: 683元 / 折扣价: 581 加购物车

在线阅读 收 藏

This standard describes the framing and signaling interface of a high performance serial link for support of FC-4s associated with upper level protocols (e.g., SCSI, IP, SBCCS, VI).

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard defines security features for use by all SCSI devices. This standard defines the security model that is basic to every device model and the parameter data that may apply to any device model.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

The SCSI family of standards provides for different transport protocols that define the methods for exchanging information between SCSI devices. This standard defines the transport methods for exchanging information between SCSI devices using a PCI Express interconnect. This standard defines a queuing layer, used by SOP.Other SCSI transport protocol standards define the methods for exchanging information between SCSI devices using other interconnects.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

The set of Small Computer System Interface (SCSI) standards consists of this standard and the SCSI implementation standards described in 4.2. This standard defines a reference model that specifies common behaviors for SCSI devices, and an abstract structure that is generic to all SCSI I/O system implementations.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard specifies the mandatory and optional operating features of a parallel bus transport for ATA commands described in the AT Attachment 8 - Command Set (ATA8-ACS) standard. It provides a common attachment interface for systems manufacturers, system integrators, software suppliers, and suppliers of intelligent storage devices.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard describes the physical interface portions of high performance electrical and optical link variants that support the higher level Fibre Channel protocols including FC-FS-4 (reference [22]). FC-PI-6P includes the parallel four-lane variants 128GFC-SW4 and 128GFC-PSM4 and the CWDMfour-wavelength variant 128GFC-CWMD4

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard defines the model and command set extensions to facilitate operation of zoned block devices.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard encompasses the following: Clause 1 describes the scope, Clause 2 provides normative references for the entire standard, Clause 3 provides definitions, abbreviations, and conventions used within the entire standard, Clause 4 describes the feature sets defined by this standard, Clause 5 describes commands, Clause 6 describes logs, Clause 7 describes command normal and error outputs, Annex A describes zoned devices from a host's perspective, Annex B provides the bibliography.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

The Simple Identity Management Profile (see clause 5) is a component profile that provides the ability to manage local accounts on a system and to represent the local system's view of a principal that is authenticated through a third-party authentication service. The Simple Identity Management Profile does not specify CIM-based mechanisms for performing the authentication of credentials.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This American National Standard for FC-SW-6 describes the operation and interaction of Fibre Channel Switches.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This standard provides a detailed refinement of the definitions and concepts in the access control architecture and framework defined by the NGAC-FA standard. To provide a precise specification of the abstractions involved, the refinements are based on the mathematics of set theory and predicate calculus in consonance with the Z notation. By capturing the essential properties of NGAC mathematically, free from constraints on how these properties are achieved, NGAC-GOADS serves as a formal, conceptual model for the composition and working of NGAC.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

In today苨 world, both private and public sectors depend upon information technology systems to perform essential and mission-critical functions. In the current environment of increasingly open and interconnected systems and networks, network and data security are essential for the effective use of information technology. Privacy and regulatory requirements highlight this need. For example, systems that perform electronic commerce must protect against unauthorized access to confidential records and unauthorized modification of data. Wireless technologies are rapidly emerging as significant components of these networks. As such, data classification and risk assessments should be performed to determine the sensitivity of, and risk to, data transmitted over wireless networks. Various methods and controls should be considered for data that is sensitive, has a high value, or represents a high value if it is vulnerable to unauthorized disclosure or undetected modification during transmission over wireless networks. These methods and controls support communications security, for example by encrypting the communication prior to transmission and decrypting it at receipt. Note that data classification and risk assessments, regardless of whether data transmission is over wired or wireless environments, should be part of an organization苨 general security policy and best practices. Refer to Annex A Wireless Validation Control Objectives for further details. Part 1 of this Standard provides an overview of wireless radio frequency (RF) technologies and general requirements applicable to all wireless implementations for the financial services industry. Subsequent parts of this Standard will address specific applications to wireless technology and associated risks, as well as technologies, methods and controls that mitigate those risks. Note that other wireless non-radio frequency technologies, such as infrared and lasers are considered out of scope of this Standard. For the purposes of this Standard the use of the terms 魋hall?and 鬽ust?are requirements and therefore mandatory, whereas 魋hould?is a recommendation. Refer to Annex B Wireless Technology for examples.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

GICS provides for Personal Identity Verification (PIV), PIV-I (PIV-Interoperable) and Common Access Card (CAC) card-applications (but not limited to these applications) to be built from a single platform. GICS defines an open platform (it is not a card application) where card applications can be instantiated and deployed according to card application profiles defined through the Part 4 template. GICS is operating system (OS) agnostic and can coexist with other platforms and/or non GICS-based applications.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏
304 条记录,每页 15 条,当前第 1 / 21 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页