Information technology. Interoperability with Assistive Technology (AT) IAccessible2 accessibility application programming interface (API)
€316.00
Information technology Security techniques. Key management Group key
Information technology. UPnP device architecture Solar Protection Blind Device Control Protocol. Two Way Motion Motor Service
€269.00
Electronic document management. Vocabulary Workflow management
€193.00
Information technology. Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 Generalized conformance
Information technology. Distributed Application Platforms and Services (DAPS). General technical principles of Service Oriented Architecture
€404.00
Information technology. Automatic identification and data capture techniques. Bar code verifier conformance specification Two-dimensional symbols
Health informatics. Personal health records. Definition, scope and context
Information technology. Automatic identification and data capture techniques Air interface for security services file management RFID architecture
Information technology. Mobile item identification and management. Consumer privacy-protection protocol for Mobile RFID services
Information technology. Security techniques. Information security management. Organizational economics
Protection profiles for secure signature creation device Overview
Security requirements for device authentication Protection profile core functionality
€374.00
Security requirements for device authentication Protection profile extension trusted channel to certificate generation application
Security requirements for device authentication Additional functionality security targets