微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

Defines an interface for the secure, extensible, and interoperable management of a distributed and heterogeneous storage system. This interface uses an object-oriented, XML-based, messaging-based protocol designed to support the specific requirements of managing devices and subsystems in this storage environment. Using this protocol, this International Standard describes the information available to a WBEM Client from an Information technology - Storage management compliant CIM WBEM Server.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support and access to file data. In addition, it provides documentation of component profiles (or subprofiles) that deal with file systems and management interface functions that may be used by other autonomous profiles not included in this part of the standard.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Defines management profiles for autonomous, component and abstract profiles for management of host-based storage devices. The autonomous profiles describe the management of a stand-alone host-based storage entity. The component profiles (or subprofiles) describe management of aspects of host-based storage entities that may be used by other autonomous profiles. Finally, this standard describes abstract profiles that may be used as a basis for creating additional Host-based autonomous profiles.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

ISO/IEC 29182-3:2014 provides Sensor Network Reference Architecture (SNRA) views. The architecture views include business, operational, systems, and technical perspectives, and these views are presented in functional, logical, and/or physical views where applicable. ISO/IEC 29182-3:2014 focuses on high-level architecture views which can be further developed by system developers and implementers for specific applications and services.

定价: 902元 / 折扣价: 767 加购物车

在线阅读 收 藏

ISO/IEC 29182-6:2014, describes and provides a compilation of sensor network applications for which International Standardized Profiles (ISPs) are needed, guidelines for the structured description of sensor network applications, and examples for structured sensor network applications. It does not cover ISPs for which drafting rules are described in ISO/IEC TR 10000. Due to the generic character of ISO/IEC 29182, fully developed ISPs will not be included in this International Standard.

定价: 665元 / 折扣价: 566 加购物车

在线阅读 收 藏

Defines the characteristics for identification cards as defined in Clause 4 of this part of ISO/IEC 7811, and the use of such cards for international interchange. This part of ISO/IEC 7811 specifies requirements for a 51,7 kA/m (650 Oe) magnetic stripe (including any protective overlay) on an identification card. The encoding technique and coded character sets are not defined, however, the specifications of ISO/IEC 7811-2 may be used. It takes into consideration both human and machine aspects and states minimum requirements.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

ISO/IEC TR 30117:2014 summarizes how the international standards, recommendations and technical reports dealing with identification cards, biometrics and/or information security relate to each other with regard to the joint use of biometrics and integrated circuit cards. It also provides further recommendations and policies needed by developers to integrate applications related to on-card biometric comparison.

定价: 546元 / 折扣价: 465 加购物车

在线阅读 收 藏

This document summarizes how some of the main international standards and recommendations approach personal identification and its related information security, with regard to the integration of biometrics and integrated circuit cards (ICCs). It also provides examples of how biometrics and ICCs are integrated in applications.

定价: 628元 / 折扣价: 534 加购物车

在线阅读 收 藏

Defines an extensible markup language (XML) based language for the description of targets, as used within the universal remote console framework for discovery purposes. A document conforming to this language is a target description.

定价: 855元 / 折扣价: 727 加购物车

在线阅读 收 藏

Defines syntax and semantics for describing atomic resources, resource sheets, groupings, and grouping sheets relevant to the user interface of a device or service ("target").

定价: 997元 / 折扣价: 848 加购物车

在线阅读 收 藏

Defines the core architecture and protocols in SMI-S. The components of SMI-S architecture include: Transport - communicating management information between constituents of the management system; Health and fault management - detecting failures through monitoring the state of storage components; General information about the object model; Names - how SMI-S uses names to allow applications to correlate across SMI-S and to other standards; Standard messages - how exceptions are presented to client applications; Service discovery - techniques clients use to discover SMI-S services; Installation and upgrade - recommendations for implementations.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Defines profiles that are supported by profiles defined in the other parts of the ISO/IEC 24775 series. The first few clauses provide background material that helps explain the purpose and profiles and recipes (a subset of a profile). Common port profiles are grouped together since they serve as transport-specific variations of a common model. The port profiles are followed by other common profiles.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support for storage networking. This standard includes four autonomous profiles: Fabric, Switch, Extender and iSCSI to FC Gateway.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Models various details of the following objects of the media library for monitoring: Library, Drives, Changer Devices, Slots, IO Slots, SCSI Interfaces and SCSI and FC Target Ports, Physical Tapes, Physical Package and Magazines.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Gives guidance for securing communications between networks using security gateways (firewall, application firewall, Intrusion Protection System, etc.) in accordance with a documented information security policy of the security gateways, including 1.identifying and analysing network security threats associated with security gateways; 2.defining network security requirements for security gateways based on threat analysis; 3.using techniques for design and implementation to address the threats and control aspects associated with typical network scenarios; and 4.addressing issues associated with implementing, operating, monitoring and reviewing network security gateway controls.

定价: 712元 / 折扣价: 606 加购物车

在线阅读 收 藏
150 条记录,每页 15 条,当前第 5 / 10 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页