Protection profiles for secure signature creation device Extension with key import and trusted channel to application
€269.00
Information technology. Process assessment Safety extension
€316.00
Information technology. IT asset management Entitlement schema
€404.00
Information technology. Process assessment. Application of conformity assessment methodology to the assessment to process quality characteristics and organizational maturity
Information technology. Document schema definition languages (DSDL) Schema association
€193.00
Information technology. Automatic identification and data capture techniques. Unique Registration procedures
€165.00
Health informatics. Identification of medicinal products. Data elements and structures for the unique identification and exchange of regulated information on pharmaceutical dose forms, units of presentation, routes of administration and packaging
Health informatics. Identification of medicinal products. Data elements and structures for the unique identification and exchange of units of measurement
€374.00
Information technology. Radio frequency identification (RFID) for item management. Software system infrastructure Architecture
Information technology. Radio frequency identification (RFID) for item management. Software system infrastructure Data management
Information technology. Radio frequency identification (RFID) for item management. Software system infrastructure Device management
BS ISO/IEC 24760-2. Information Technology. Security Techniques. A Framework for Identity Management. Part 2. Reference architecture and requirements
€23.00
Information technology. Security techniques. A framework for identity management Reference architecture and requirements
Information technology. Governance of IT. Implementation guide
Financial services. Key management (retail) Symmetric ciphers, their key and life cycle