Specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The choice and conditions of use of cryptographic mechanism in security operations can affect card exportability. The evaluation of the suitability of algorithms and protocols is outside the scope of this document. It does not cover the internal implementation within the card and/or the outside world.
定价: 801元 / 折扣价: 681 元 加购物车
Provides the directory capabilities required by many application layer standards and telecommunication services. Among the capabilities which it provides are those of "user-friendly naming", whereby objects can be referred to by names which are suitable for citing by human users (though not all objects need have user-friendly names); and "name-to-address mapping" which allows the binding between objects and their locations to be dynamic.
定价: 978元 / 折扣价: 832 元 加购物车
Specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
定价: 1310元 / 折扣价: 1114 元 加购物车
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining mechanisms require an on-line trusted third party for the establishment of a common secret key. They also realize mutual or unilateral entity authentication. Annex A defines Object Identifiers for the mechanisms specified in this document.
定价: 532元 / 折扣价: 453 元 加购物车
Provides an overview of and guidance on interactions between cloud service partners (CSNs), specifically cloud service brokers, cloud service developers and cloud auditors, and other cloud service roles. In addition, this document describes how cloud service agreements (CSAs) and cloud service level agreements (cloud SLAs) can be used to address those interactions.
定价: 1149元 / 折扣价: 977 元 加购物车
Contains descriptions of and analyses of current practices on multimodal and other multibiometric fusion, including (as appropriate) references to more detailed descriptions. ISO/IEC TR 24722:2015 contains descriptions and explanations of high-level multibiometric concepts to aid in the explanation of multibiometric fusion approaches including multi-characteristic-type, multi instance, multisensorial, multi algorithmic, decision-level and score-level logic.
定价: 475元 / 折扣价: 404 元 加购物车
Provides a description of a set of common technologies and techniques used in conjunction with cloud computing. These include virtual machines (VMs) and hypervisors; containers and container management systems (CMSs); serverless computing; microservices architecture; automation; platform as a service systems and architecture; storage services; security, scalability and networking as applied to the above cloud computing technologies.
定价: 1471元 / 折扣价: 1251 元 加购物车
Defines a process reference model for the domain of service management. The model specifies a process architecture for the domain and comprises a set of processes. Each process is described in terms of process purpose and outcomes. The process reference model in this document is directed at assessment sponsors and competent assessors who wish to select a model, and associated documented process method, for assessment (for either capability determination or process improvement).
定价: 1471元 / 折扣价: 1251 元 加购物车
Specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In general, this guidance is applicable to the software developed, reviewed, or maintained for any application. This document describes the way that the vulnerabilities listed in ISO/IEC TR 24772-1 are manifested or avoided in the C language.
定价: 1310元 / 折扣价: 1114 元 加购物车
我的标准
购物车
400-168-0010






对不起,暂未有相关搜索结果!










