Provides detailed technical guidance on how organizations can define an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection (security) of information where it is stored and to the security of the information being transferred across the communication links associated with storage. Storage security includes the security of devices and media, the security of management activities related to the devices and media, the security of applications and services, and security relevant to end-users during the lifetime of devices and media and after end of use.
定价: 1196元 / 折扣价: 1017 元 加购物车
Provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are "fit for purpose". It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.
定价: 546元 / 折扣价: 465 元 加购物车
Provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are "fit for purpose". It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.
定价: 722元 / 折扣价: 614 元 加购物车
Provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability. It encapsulates best practice for selection, design, and implementation of analytical processes and recording sufficient information to allow such processes to be subjected to independent scrutiny when required. It provides guidance on appropriate mechanisms for demonstrating proficiency and competence of the investigative team.
定价: 722元 / 折扣价: 614 元 加购物车
Provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes. The guidelines describe processes and principles applicable to various kinds of investigations, including, but not limited to, unauthorized access, data corruption, system crashes, or corporate breaches of information security, as well as any other digital investigation.
定价: 738元 / 折扣价: 628 元 加购物车
Provides a method to determine the ink cartridge photo yield of ink-containing cartridges (i.e. integrated ink cartridges and ink cartridges without integrated print heads) for colour photo printing with colour inkjet printers and multi-function devices that contain inkjet printer components. Ink cartridge yields determined on one printer model, paper and cartridge configuration are not applicable to another printer model or cartridge configuration even if the ink jet cartridges used in testing are the same.
定价: 628元 / 折扣价: 534 元 加购物车
Provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes. Specifies steps in assessing processes to determine privacy capability, specifies a set of levels for privacy capability assessment, provides guidance on the key process areas against which privacy capability can be assessed, provides guidance for those implementing process assessment, and provides guidance on how to integrate the privacy capability assessment into organizations operations.
定价: 722元 / 折扣价: 614 元 加购物车
ISO/IEC 29197:2015 addresses
? fundamental requirements for planning and execution of environmental performance evaluations for biometric systems based on scenario and operational test methodologies,
? specifications to define, establish, and measure specific conditions to assess, including requirements for equipment,
? requirements for establishing a baseline performance in order to compare the influence of environmental parameters,
? a specification of the biometric evaluation including requirements for test population, test protocols, data to record, and test results, and
? procedures for carrying out the overall evaluation.
It does not
? determine which parameters should be analysed for a specific biometric modality (This is currently covered in ISO/IEC/TR 19795‑3.),
? specify requirements to perform a vulnerability analysis modifying environmental factors (This is covered by ISO/IEC 19792.),
? classify biometric systems upon performance against different environmental conditions, or
? specify requirements for determining the functional effects of environmental conditions on hardware components (such as corrosion, electrical interference, breakage, etc.) of biometric systems.
定价: 683元 / 折扣价: 581 元 加购物车
This Standard provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of information technology (IT) within their organizations. It also provides guidance to those advising, informing, or assisting governing bodies.
定价: 546元 / 折扣价: 465 元 加购物车
ANSI X9.82 is concerned with the generation of random bits, primarily for use in cryptographic applications. While there has been extensive research on the subject of generating (pseudo)random bits using a Random Bit Generator (RBG) and an unknown seed value, creating such an unknown value has not been as well documented. As Part 1 of this Standard establishes, the only way for this seed value to provide real security is for it to be obtained from a source that provides sufficient entropy. Directly or indirectly, the seeding of an RBG will rely upon a non-deterministic process ?i.e., an entropy source. This part of ANS X9.82 describes the properties that an entropy source must have to make it suitable for use by cryptographic random bit generators.
定价: 546元 / 折扣价: 465 元 加购物车
Describes the model and protocol for management interactions between a cloud Infrastructure as a Service (IaaS) Provider and the Consumers of an IaaS service. The basic resources of IaaS (machines, storage, and networks) are modeled with the goal of providing Consumer management access to an implementation of IaaS and facilitating portability between cloud implementations that support the specification. This document specifies a Representational State Transfer (REST)-style protocol using HTTP. However, the underlying model is not specific to HTTP, and it is possible to map it to other protocols as well.
定价: 1633元 / 折扣价: 1389 元 加购物车
Specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1 and ISO/IEC 27001. It is primarily intended to support the accreditation of certification bodies providing ISMS certification.
定价: 475元 / 折扣价: 404 元 加购物车
Provides guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. Provides controls and guidance specifically relating to initiating, implementing, maintaining, and improving information security in inter-organizational and inter-sector communications. It provides guidelines and general principles on how the specified requirements can be met using established messaging and other technical methods.
定价: 738元 / 折扣价: 628 元 加购物车
Provides guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. Provides controls and guidance specifically relating to initiating, implementing, maintaining, and improving information security in inter-organizational and inter-sector communications. It provides guidelines and general principles on how the specified requirements can be met using established messaging and other technical methods.
定价: 1149元 / 折扣价: 977 元 加购物车