BBSQ Facebook Page
BBSQ Instagram Page
1(242) 362-1748
thru 55
$
2,225.98
16
Cart
BBSQ Facebook Page
BBSQ Instagram Page
$
2,225.98
16
Cart
Home
About Us
About us Overview
Team
FAQ
Metrology
Metrology
Legal Metrology
Legal Metrology
Legal Metrology Services
Industrial Metrology
Industrial Metrology
Industrial Metrology Services
Standards
Standards
Purchase Standards
ISO International Standards
Standards Under Development
How to get involved
Conformity Assessment
Accreditation
Information Services
Information Services Overview
Library
News & Events
News & Events Overview
Holidays
Contact
Contact BBSQ
Careers
RFP/REIO
Shop
“Information technology — Rich media user interfaces — Part 2: Advanced user interaction (AUI) interfaces” has been added to your cart.
View cart
Showing 5485–5496 of 13086 results
Default sorting
Sort by popularity
Sort by latest
Sort by price: low to high
Sort by price: high to low
Information technology — Security techniques — Best practices for the provision and use of time-stamping services
$
140.11
Add to cart
Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications
$
145.76
Add to cart
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
$
163.84
Add to cart
Information technology — Security techniques — Code of practice for personally identifiable information protection
$
187.57
Add to cart
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
$
140.11
Add to cart
Information technology — Security techniques — Competence requirements for information security management systems professionals — Amendment 1: Addition of ISO/IEC 27001:2013 clauses or subclauses to competence requirements
$
19.21
Add to cart
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
$
140.11
Add to cart
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
$
219.21
Add to cart
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
$
244.07
Add to cart
Information technology — Security techniques — Entity authentication assurance framework
$
195.48
Add to cart
Information technology — Security techniques — Guidance for the production of protection profiles and security targets
$
211.30
Add to cart
Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method
$
103.95
Add to cart
←
1
2
3
…
455
456
457
458
459
460
461
…
1,089
1,090
1,091
→