Documentos Temporales
�(PLEN)
�[�Origen:�ISO/IEC JTC 1/SC27�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 563-PLEN ]
�
� |
LS/i on Text for ISO/IEC FDIS 27033-4, Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways
�
� |
ISO/IEC JTC 1/SC27
� |
WP1/17, Q7/17
� |
2013-08-20 |
|
[ 551-PLEN ]
�
� |
LS/i on 3rd WD 27033-6 - Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access [N12660 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
WP1/17, Q1/17
� |
2013-07-22 |
|
[ 546-PLEN ]
�
� |
LS/i on Disposition of Comments on SC 27 N12294 Summary of National Body comments received on SC 27 N11916 -- ISO/IEC 4th WD 27017 - Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 [N12767 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q8/17
� |
2013-07-22 |
|
[ 545-PLEN ]
�
� |
LS/i on ISO/IEC 2nd CD 27043 - Information technology -- Security techniques - Incident investigation principles and processes [N12687 from ISO/IEC JTC 1/SC27
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 544-PLEN ]
�
� |
LS/i on 1st WD 27050 - Text for ISO/IEC 1st WD 27050, Information technology - Security techniques - Electronic discovery [N12679 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q3/17
� |
2013-07-22 |
|
[ 543-PLEN ]
�
� |
LS/i on 3rd WD 27035-3 - Text for ISO/IEC 3rd WD 27035-3, - Security techniques - Information security incident management - Part 3: Guidelines for incident response operations [N12672 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 542-PLEN ]
�
� |
LS/i on 3rd WD 27035-2 - Text for ISO/IEC 3rd WD 27035-2, Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response [N12670 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 541-PLEN ]
�
� |
LS/i on 3rd WD 27035-1 - Text for ISO/IEC 3rd WD 27035-1, Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management [N12668 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 540-PLEN ]
�
� |
LS/i on 3rd WD 27034-6 - Text for Information technology - Security techniques - Application security - Part 6: Security guidance for specific applications [N12666 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q7/17
� |
2013-07-22 |
|
[ 539-PLEN ]
�
� |
LS/i on Text for ISO/IEC DIS 27039 - Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) [N12689 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 538-PLEN ]
�
� |
LS/i on ISO/IEC 2nd CD 27042 - Information technology -- Security techniques - Guidelines for the analysis and interpretation of digital evidence [N12685 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 537-PLEN ]
�
� |
LS/i on ISO/IEC CD 27041 - Information technology -- Security techniques - Guidance on assuring suitability and adequacy of incident investigation methods [N12683 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q4/17, Q3/17
� |
2013-07-22 |
|
[ 536-PLEN ]
�
� |
LS/i on ISO/IEC 3rd CD 27040 - Information technology - Security techniques - Storage security [N12681 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q1/17, (Q3/17), (Q2/17)
� |
2013-07-22 |
|
[ 535-PLEN ]
�
� |
LS/i on Report 2nd SP Sec Cloud Tech Stds - Report on the 2nd study period in the area of Cloud security technology standards [N12650 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q8/17, (Q3/17)
� |
2013-07-22 |
|
[ 534-PLEN ]
�
� |
LS/i on Liaison Statement to ITU-T SG 17 [N12518 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
WP1/17, Q9/17, Q8/17, Q4/17, Q10/17, Q1/17, (QALL/17), (Q3/17)
� |
2013-07-22 |
|
[ 533-PLEN ]
�
� |
LS/i on Text for ISO/IEC 5th WD 27017 based on DoC (N12767) - Information technology - Security techniques - Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 [N12429 from ISO/IEC JTC 1/SC27]
�
� |
ISO/IEC JTC 1/SC27
� |
Q8/17, (Q3/17)
� |
2013-07-22 |
|
[ 508-PLEN ]
�
� |
LS/i on a Framework for PKI Policy / Practices / Audit [to ISO/TC68/SC2, ETSI TC ESI and ITU-T SG17]
�
� |
ISO/IEC JTC 1/SC27
� |
Q11/17, (Q7/17), (ALL/17)
� |
2013-06-11 |
Resultados :17 documentos
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):