微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

Provides Messages that facilitate integrated or "smart" monitoring and control of Resources in those islands. The Messages are exchanged between the Management Function and Resources. ISO/IEC 19395:2015 acknowledges that those Resources may be composed of other Resources (e.g. a rack may contain servers, ventilators, etc.). In addition, e.g. those servers may be viewed from their computing, energy consumption or dissipation aspects which ISO/IEC 19395:2015 models as Resource Components and groups into IT, power and fluid Domains, respectively.

定价: 1149元 / 折扣价: 977 加购物车

在线阅读 收 藏

Provides requirements and guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS's unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization ?either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware).

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

Provides requirements and guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS's unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization ?either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware).

定价: 722元 / 折扣价: 614 加购物车

在线阅读 收 藏

Describes the model and protocol for management interactions between a cloud Infrastructure as a Service (IaaS) Provider and the Consumers of an IaaS service. The basic resources of IaaS (machines, storage, and networks) are modeled with the goal of providing Consumer management access to an implementation of IaaS and facilitating portability between cloud implementations that support the specification. This document specifies a Representational State Transfer (REST)-style protocol using HTTP. However, the underlying model is not specific to HTTP, and it is possible to map it to other protocols as well.

定价: 1633元 / 折扣价: 1389 加购物车

在线阅读 收 藏

Specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1 and ISO/IEC 27001. It is primarily intended to support the accreditation of certification bodies providing ISMS certification.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

Provides guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. Provides controls and guidance specifically relating to initiating, implementing, maintaining, and improving information security in inter-organizational and inter-sector communications. It provides guidelines and general principles on how the specified requirements can be met using established messaging and other technical methods.

定价: 738元 / 折扣价: 628 加购物车

在线阅读 收 藏

Provides guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. Provides controls and guidance specifically relating to initiating, implementing, maintaining, and improving information security in inter-organizational and inter-sector communications. It provides guidelines and general principles on how the specified requirements can be met using established messaging and other technical methods.

定价: 1149元 / 折扣价: 977 加购物车

在线阅读 收 藏

Provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability. It encapsulates best practice for selection, design, and implementation of analytical processes and recording sufficient information to allow such processes to be subjected to independent scrutiny when required. It provides guidance on appropriate mechanisms for demonstrating proficiency and competence of the investigative team. Provides a common framework, for the analytical and interpretational elements of information systems security incident handling, which can be used to assist in the implementation of new methods and provide a minimum common standard for digital evidence produced from such activities.

定价: 525元 / 折扣价: 447 加购物车

在线阅读 收 藏

Provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes. The guidelines describe processes and principles applicable to various kinds of investigations, including, but not limited to, unauthorized access, data corruption, system crashes, or corporate breaches of information security, as well as any other digital investigation.

定价: 1149元 / 折扣价: 977 加购物车

在线阅读 收 藏

Specifies methods to determine chemical emission rates of analyte from information and communication technology (ICT) and consumer electronics (CE) equipment during intended operation in an Emission Test Chamber (ETC). The methods comprise preparation, sampling (or monitoring) in a controlled ETC, storage and analysis, calculation and reporting of emission rates. Includes specific methods for equipment using consumables, such as printers, and equipment not using consumables, such as monitors and PCs. It also specifies monochrome and colour print patterns for use in the operating phase of EUT using consumables (e.g. paper).

定价: 847元 / 折扣价: 720 加购物车

在线阅读 收 藏

Provides a method to determine the ink cartridge photo yield of ink-containing cartridges (i.e. integrated ink cartridges and ink cartridges without integrated print heads) for colour photo printing with colour inkjet printers and multi-function devices that contain inkjet printer components. Ink cartridge yields determined on one printer model, paper and cartridge configuration are not applicable to another printer model or cartridge configuration even if the ink jet cartridges used in testing are the same.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

Provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes. In particular, it specifies steps in assessing processes to determine privacy capability, specifies a set of levels for privacy capability assessment, provides guidance on the key process areas against which privacy capability can be assessed, provides guidance for those implementing process assessment, and provides guidance on how to integrate the privacy capability assessment into organizations operations.

定价: 525元 / 折扣价: 447 加购物车

在线阅读 收 藏

Addresses fundamental requirements for planning and execution of environmental performance evaluations for biometric systems based on scenario and operational test methodologies, specifications to define, establish, and measure specific conditions to assess, including requirements for equipment, requirements for establishing a baseline performance in order to compare the influence of environmental parameters, a specification of the biometric evaluation including requirements for test population, test protocols, data to record, and test results, and procedures for carrying out the overall evaluation.

定价: 978元 / 折扣价: 832 加购物车

在线阅读 收 藏

Provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of information technology (IT) within their organizations. It also provides guidance to those advising, informing, or assisting governing bodies.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

This amendment updates ANSI INCITS 496-2012, FC-SP-2, to support additional cryptographic algorithms.

定价: 570元 / 折扣价: 485 加购物车

在线阅读 收 藏
269 条记录,每页 15 条,当前第 3 / 18 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页