微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

The set of Small Computer System Interface (SCSI) standards consists of this standard and the SCSI implementation standards described in 4.2. This standard defines a reference model that specifies common behaviors for SCSI devices, and an abstract structure that is generic to all SCSI I/O system implementations.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

Specifies the mandatory and optional operating features of a parallel bus transport for ATA commands described in the AT Attachment 8 - Command Set (ATA8-ACS) standard. It provides a common attachment interface for systems manufacturers, system integrators, software suppliers, and suppliers of intelligent storage devices. This document specifies the connectors, cables, electrical, and logic parameters for the interconnect between a device and the host, and the transport protocols for transporting commands, data, status, and other relevant communications across a parallel bus interface.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

Describes the physical interface portions of high performance electrical and optical link variants that support the higher level Fibre Channel protocols including FC-FS-4 (reference [22]). FC-PI-6P includes the parallel four-lane variants 128GFC-SW4 and 128GFC-PSM4 and the CWDMfour-wavelength variant 128GFC-CWMD4.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

Defines the model and command set extensions to facilitate operation of zoned block devices.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

The Simple Identity Management Profile (see clause 5) is a component profile that provides the ability to manage local accounts on a system and to represent the local system's view of a principal that is authenticated through a third-party authentication service. The Simple Identity Management Profile does not specify CIM-based mechanisms for performing the authentication of credentials.

定价: 456元 / 折扣价: 388 加购物车

在线阅读 收 藏

In today苨 world, both private and public sectors depend upon information technology systems to perform essential and mission-critical functions. In the current environment of increasingly open and interconnected systems and networks, network and data security are essential for the effective use of information technology. Privacy and regulatory requirements highlight this need. For example, systems that perform electronic commerce must protect against unauthorized access to confidential records and unauthorized modification of data. Wireless technologies are rapidly emerging as significant components of these networks. As such, data classification and risk assessments should be performed to determine the sensitivity of, and risk to, data transmitted over wireless networks. Various methods and controls should be considered for data that is sensitive, has a high value, or represents a high value if it is vulnerable to unauthorized disclosure or undetected modification during transmission over wireless networks. These methods and controls support communications security, for example by encrypting the communication prior to transmission and decrypting it at receipt. Note that data classification and risk assessments, regardless of whether data transmission is over wired or wireless environments, should be part of an organization苨 general security policy and best practices. Refer to Annex A Wireless Validation Control Objectives for further details. Part 1 of this Standard provides an overview of wireless radio frequency (RF) technologies and general requirements applicable to all wireless implementations for the financial services industry. Subsequent parts of this Standard will address specific applications to wireless technology and associated risks, as well as technologies, methods and controls that mitigate those risks. Note that other wireless non-radio frequency technologies, such as infrared and lasers are considered out of scope of this Standard. For the purposes of this Standard the use of the terms 魋hall?and 鬽ust?are requirements and therefore mandatory, whereas 魋hould?is a recommendation. Refer to Annex B Wireless Technology for examples.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

Defines security features for use by all SCSI devices. This standard defines the security model that is basic to every device model and the parameter data that may apply to any device model.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

GICS provides for Personal Identity Verification (PIV), PIV-I (PIV-Interoperable) and Common Access Card (CAC) card-applications (but not limited to these applications) to be built from a single platform. GICS defines an open platform (it is not a card application) where card applications can be instantiated and deployed according to card application profiles defined through the Part 4 template. GICS is operating system (OS) agnostic and can coexist with other platforms and/or non GICS-based applications.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

FC-SW-6 describes the operation and interaction of Fibre Channel Switches.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

The set of AT Attachment standards consists of this standard and the ATA implementation standards described in AT Attachment - 8 ATA/ATAPI Architecture Model (ATA8-AAM). This standard specifies the command set that host systems use to access storage devices that implement the Host Aware Zones feature set (see 4.3) or the Host Managed Zones feature set (see 4.4). This standard provides a common command set for systems manufacturers, system integrators, software suppliers, and suppliers of storage devices that provide one of the zones feature sets.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

Theft of sensitive card data during a retail payment transaction is increasingly becoming a major source of financial fraud. Besides an optional encrypted PIN, this data includes magnetic stripe track 2 data: PAN, expiration date, card verification value, and issuer private data. While thefts of this data at all segments of the transaction processing system have been reported, the most vulnerable segments are between the point of transaction device capturing the magnetic stripe data and the processing systems at the acquirer. This document would standardize the security requirements and implementation for a method for protecting this sensitive card data over these segments. Several implementations exist to address this situation. This document would provide guidance for evaluating these implementations. Clarification based on card brand guidance for the encryption of the middle digits has been added to this document. This supports the automated fuel dispenser industry.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

This amendment updates INCITS 479-2011, FC-PI-5, to allow for forward error correction on 16GFC EL variants.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

Testing in part 3 is limited to definition for what testing is required and does not provide technical guidelines on the methodology to be used during the testing and validation of applicable components. Focuses on platform conformance testing of Part 1 and Part 2, and focuses on what needs to be tested to enforce full functionality and interoperability. In particular, instances of brute force, exhaustive, or open-ended negative testing are not specified in the requirements here-in. There are no test requirements for negative testing to determine abnormal behavior with the exception of interrogating access control rules and elicitation of error codes where possible and appropriate.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

Amendment to INCITS 536-2016.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏

Specifies requirements for the collection, management and publication of terminology in the field of geographic information. The scope of this document includes: selection of concepts, harmonization of concepts and development of concept systems, structure and content of terminological entries, term selection, definition preparation, cultural and linguistic adaptation, layout and formatting requirements in rendered documents, and establishment and management of terminology registers.

定价: 1633元 / 折扣价: 1389 加购物车

在线阅读 收 藏
219 条记录,每页 15 条,当前第 2 / 15 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页