微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

Defines the core architecture and protocols in SMI-S. The components of SMI-S architecture include: Transport - communicating management information between constituents of the management system; Health and fault management - detecting failures through monitoring the state of storage components; General information about the object model; Names - how SMI-S uses names to allow applications to correlate across SMI-S and to other standards; Standard messages - how exceptions are presented to client applications; Service discovery - techniques clients use to discover SMI-S services; Installation and upgrade - recommendations for implementations.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Defines profiles that are supported by profiles defined in the other parts of the ISO/IEC 24775 series. The first few clauses provide background material that helps explain the purpose and profiles and recipes (a subset of a profile). Common port profiles are grouped together since they serve as transport-specific variations of a common model. The port profiles are followed by other common profiles.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support for storage networking. This standard includes four autonomous profiles: Fabric, Switch, Extender and iSCSI to FC Gateway.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Models various details of the following objects of the media library for monitoring: Library, Drives, Changer Devices, Slots, IO Slots, SCSI Interfaces and SCSI and FC Target Ports, Physical Tapes, Physical Package and Magazines.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Provides an authentication protocol suitable for use in physical and logical access control systems based on ICCs and related systems which support standards based AES-128 and RSA-2048 ciphers and the SHA-256 hashing algorithm. It specifies PLAID and its implementation in sufficient detail to allow any two or more implementations to be interoperable. It does not address how implementations share cryptographic keys, access control system credential records (including revocation) or manage payload entities such as PIN, PINHash, or biometric templates or other payload objects.

定价: 890元 / 折扣价: 757 加购物车

在线阅读 收 藏

Provides an authentication protocol suitable for use in physical and logical access control systems based on ICCs and related systems which support standards based AES-128 and RSA-2048 ciphers and the SHA-256 hashing algorithm. It specifies PLAID and its implementation in sufficient detail to allow any two or more implementations to be interoperable. It does not address how implementations share cryptographic keys, access control system credential records (including revocation) or manage payload entities such as PIN, PINHash, or biometric templates or other payload objects.

定价: 978元 / 折扣价: 832 加购物车

在线阅读 收 藏

Provides the guidelines to plan and prepare for incident response. The guidelines are based on the "Plan and Prepare" phase and the "Lessons Learned" phase of the "Information security incident management phases" model presented in ISO/IEC 27035-1. The principles given in this part of ISO/IEC 27035 are generic and intended to be applicable to all organizations, regardless of type, size or nature. Organizations can adjust the guidance given in this part of ISO/IEC 27035 according to their type, size and nature of business in relation to the information security risk situation. This part of ISO/IEC 27035 is also applicable to external organizations providing information security incident management services.

定价: 1025元 / 折扣价: 872 加购物车

在线阅读 收 藏

ISO/IEC 29120-1 establishes

? machine readable records for documenting the output of a biometric test,

? formats for data that ISO/IEC 19795 tests are required to report, and

? an ASN.1 syntax for test reports.

This standard specifically does not

? require, prohibit, or otherwise specify, the format of biometric samples or templates used in a test,

? require, prohibit or otherwise specify, the encapsulation of biometric samples or templates used in a test, or

? regulate metrics for tests.

NOTE ISO/IEC 19795‑1 establishes the reportable metrics.

定价: 910元 / 折扣价: 774 加购物车

在线阅读 收 藏

Specifies three hash-functions suitable for applications requiring lightweight cryptographic implementations. - PHOTON: a lightweight hash-function with permutation sizes of 100, 144, 196, 256 and 288 bits computing hash-codes of length 80, 128, 160, 224, and 256 bits, respectively. - SPONGENT: a lightweight hash-function with permutation sizes of 88, 136, 176, 240 and 272 bits computing hash-codes of length 88, 128, 160, 224, and 256 bits, respectively. - Lesamnta-LW: a lightweight hash-function with permutation size 384 bits computing a hash-code of length 256 bits. The requirements for lightweight cryptography are given in ISO/IEC 29192-1.

定价: 722元 / 折扣价: 614 加购物车

在线阅读 收 藏

For any or all biometric sample types as necessary, establishes the following: terms and definitions that are useful in the specification and use of quality metrics; purpose and interpretation of biometric quality scores; encoding of quality data fields in biometric data interchange formats; methods for developing biometric sample datasets for the purpose of quality score normalisation; format for exchange of quality algorithm results; methods for aggregation of quality scores. The following are outside the scope of ISO/IEC 29794-1:2016: specification of minimum requirements for sample, module, or system quality scores; performance assessment of quality algorithms; standardization of quality algorithms.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

specifies the lifecycle process requirements performed by the IT enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish, implement, operate, monitor, review, maintain and improve its services. This document covers IT enabled business processes that are outsourced; is not intended to cover IT services but includes similar, relevant process for completeness; is applicable to the service provider, not to the customer; is applicable to all lifecycle processes of ITES-BPO; serves as a process assessment model for organizations providing ITES-BPO services that: conforms to the requirements of ISO/IEC 33004; supports the performance assessment by providing indicators for the interpretation of the process purposes and outcomes, as defined in ISO/IEC 24774, and the process attributes, as defined in ISO/IEC 33020.

定价: 1479元 / 折扣价: 1258 加购物车

在线阅读 收 藏

Specifies the lifecycle process requirements performed by the IT enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish, implement, operate, monitor, review, maintain and improve its services. This document covers IT enabled business processes that are outsourced; is not intended to cover IT services but includes similar, relevant process for completeness; is applicable to the service provider, not to the customer.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

Specifies the lifecycle process requirements performed by the IT enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish, implement, operate, monitor, review, maintain and improve its services. This document covers IT enabled business processes that are outsourced; is not intended to cover IT services but includes similar, relevant process for completeness; is applicable to the service provider, not to the customer; is applicable to all lifecycle processes of ITES-BPO; serves as a measurement framework for processes and provide an organization maturity model for organizations providing ITES-BPO services that: conforms to the requirements of ISO/IEC 33003 and ISO/IEC 33004; supports the performance assessment by providing a framework to measure and derive capability and organization maturity levels.

定价: 890元 / 折扣价: 757 加购物车

在线阅读 收 藏

Specifies the lifecycle process requirements performed by the IT enabled business process outsourcing service provider for the outsourced business processes. It defines the processes to plan, establish, implement, operate, monitor, review, maintain and improve its services. This document covers IT enabled business processes that are outsourced; is not intended to cover IT services but includes similar, relevant process for completeness; is applicable to the service provider, not to the customer.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

Defines the power usage effectiveness (PUE) of a data centre, introduces PUE measurement categories, describes the relationship of this KPI to a data centre's infrastructure, information technology equipment and information technology operations, defines the measurement, the calculation and the reporting of the parameter, provides information on the correct interpretation of the PUE. PUE derivatives are described in Annex D.

定价: 978元 / 折扣价: 832 加购物车

在线阅读 收 藏
219 条记录,每页 15 条,当前第 9 / 15 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页