微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

定价: 173元 / 折扣价: 148 加购物车

在线阅读 收 藏
JIS C 3108:2016e Hard-drawn aluminium wires for electric purposes 现行 发布日期 :  1955-06-21 实施日期 : 

定价: 401元 / 折扣价: 341 加购物车

在线阅读 收 藏

定价: 201元 / 折扣价: 171 加购物车

在线阅读 收 藏

定价: 201元 / 折扣价: 171 加购物车

在线阅读 收 藏

Defines the following: A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings containing characters from the full repertoire of ISO/IEC 10646. This method is also applicable to subsets of that repertoire, such as those of the different ISO/IEC 8-bit standard character sets, or any other character set, standardized or not, to produce ordering results valid (after tailoring) for a given set of languages for each script. This method uses collation tables derived either from the Common Template Table defined in this International Standard or from one of its tailorings. This method provides a reference format. The format is described using the Backus-Naur Form (BNF). This format is used to describe the Common Template Table. The format is used normatively within this International Standard.

定价: 847元 / 折扣价: 720 加购物车

在线阅读 收 藏

Specifies the interface to access cloud storage and to manage the data stored therein. It is applicable to developers who are implementing or using cloud storage.

定价: 1056元 / 折扣价: 898 加购物车

在线阅读 收 藏

Gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods. Conformance testing assures that an implementation of a cryptographic algorithm or security mechanism is correct whether implemented in hardware, software or firmware. It also confirms that it runs correctly in a specific operating environment. Testing can consist of known-answer or Monte Carlo testing, or a combination of test methods. Testing can be performed on the actual implementation or modelled in a simulation environment.

定价: 1471元 / 折扣价: 1251 加购物车

在线阅读 收 藏

Details the requirements for use of the Transport Layer Security (TLS) protocol in conjunction with data storage technologies. The requirements set out in this specification are intended to facilitate secure interoperability of storage clients and servers as well as non-storage technologies that may have similar interoperability needs. Standard is relevant to anyone involved in owning, operating or using data storage devices. This includes senior managers, acquirers of storage product and service, and other non-technical managers or users, in addition to managers and administrators who have specific responsibilities for information security and/or storage security, storage operation, or who are responsible for an organization's overall security program and security policy development. It is also relevant to anyone involved in the planning, design and implementation of the architectural aspects of storage security.

定价: 475元 / 折扣价: 404 加购物车

在线阅读 收 藏

Defines the LTFS Format requirements for interchanged media that claims LTFS compliance. Those requirements are specified as the size and sequence of data blocks and file marks on the media, the content and form of special data constructs (the LTFS Label and LTFS Index), and the content of the partition labels and use of MAM parameters. The data content (not the physical media) of the LTFS format shall be interchangeable among all data storage systems claiming conformance to this format. Physical media interchange is dependent on compatibility of physical media and the media access devices in use. Does not contain instructions or tape command sequences to build the LTFS structure.

定价: 956元 / 折扣价: 813 加购物车

在线阅读 收 藏

Defines the requirements for the use of ISO/IEC 27001 in any specific sector (field, application area or market sector). It explains how to include requirements additional to those in ISO/IEC 27001, how to refine any of the ISO/IEC 27001 requirements, and how to include controls or control sets in addition to ISO/IEC 27001:2013, Annex A. It ensures that additional or refined requirements are not in conflict with the requirements in ISO/IEC 27001. It is applicable to those involved in producing sector-specific standards that relate to ISO/IEC 27001.

定价: 390元 / 折扣价: 332 加购物车

在线阅读 收 藏

Define guidelines supporting the implementation of information security controls in telecommunications organizations. Adoption will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant security property.

定价: 836元 / 折扣价: 711 加购物车

在线阅读 收 藏

ISO/IEC 29197:2015 addresses

? fundamental requirements for planning and execution of environmental performance evaluations for biometric systems based on scenario and operational test methodologies,

? specifications to define, establish, and measure specific conditions to assess, including requirements for equipment,

? requirements for establishing a baseline performance in order to compare the influence of environmental parameters,

? a specification of the biometric evaluation including requirements for test population, test protocols, data to record, and test results, and

? procedures for carrying out the overall evaluation.

It does not

? determine which parameters should be analysed for a specific biometric modality (This is currently covered in ISO/IEC/TR 19795‑3.),

? specify requirements to perform a vulnerability analysis modifying environmental factors (This is covered by ISO/IEC 19792.),

? classify biometric systems upon performance against different environmental conditions, or

? specify requirements for determining the functional effects of environmental conditions on hardware components (such as corrosion, electrical interference, breakage, etc.) of biometric systems.

定价: 683元 / 折扣价: 581 加购物车

在线阅读 收 藏
7235 条记录,每页 15 条,当前第 22 / 483 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页