"Information technology " CNS Standards List| Metric Taps | Hand Operated | Welding allied | Studs Stud | Dental explorers | Foot leg | Method Test | Information technology | |
|
CNS 15264-4
2019 Edition Information technology - Process assessment - Part 4: Guidance on use for process improvement and process capability determination 資訊技術ï¼éŽç¨‹è©•é‘‘ï¼ç¬¬ï¼”部:éŽç¨‹æ”¹å–„與éŽç¨‹èƒ½åŠ›åˆ¤å®šä½¿ç”¨ä¹‹æŒ‡å— |
||
|
CNS 29100-1
2019 Edition Information technology − Security techniques − Specification for a personal information management system 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å€‹è³‡ç®¡ç†ç³»çµ±è¦æ±‚äº‹é … |
||
|
CNS 15327-1
2019 Edition Information technology − Automatic identification and data capture techniques − Unique identification − Part 1: Individual transport units 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼å”¯ä¸€è˜åˆ¥ï¼ç¬¬1部:個別é‹é€å–®å…ƒ |
||
|
CNS 15327-5
2019 Edition Information technology − Automatic identification and data capture techniques − Unique identification − Part 5: Individual returnable transport items (RTIs) 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼å”¯ä¸€è˜åˆ¥ï¼ç¬¬5部:個別å¯é€€é‚„é‹é€å“é … |
||
|
CNS 14331-3
2019 Edition Information technology-Open systems interconnection-International standardized profiles:OSI distributed transaction processing-Part 3:Support of CCR APDUs 資訊技術ï¼é–‹æ”¾ç³»çµ±äº’連ï¼åœ‹éš›æ¨™æº–è¦ç¯„:開放系統互連分散交易處ç†ï¼ç¬¬3部:承諾ã€åŒä½œåŠå¾©åŽŸæ‡‰ç”¨å”å®šè³‡æ–™å–®å…ƒä¹‹æ”¯æ´ |
||
|
CNS 13886
2019 Edition Information technology – Coded graphic character set for text communication – Latin alphabet 資訊技術ï¼ä¾›æ–‡å—通信使用之碼化圖形å—元集ï¼æ‹‰ä¸å—æ¯ |
||
|
CNS 15327-2
2019 Edition Information technology − Automatic identification and data capture techniques − Unique identification − Part 2: Registration procedures 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼å”¯ä¸€è˜åˆ¥ï¼ç¬¬2éƒ¨ï¼šç™»éŒ„ç¨‹åº |
||
|
CNS 14381-3
2019 Edition Information technology - Security techniques - Key management - Part 3 : Mechanism using asymmetric techniques 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬ï¼“部:使用éžå°ç¨±æŠ€è¡“的機制 |
||
|
CNS 14929-5
2019 Edition Information technology - Guidelines for the management of IT security - Part 5: Management guidance on network security 資訊技術ï¼è³‡è¨ŠæŠ€è¡“安全管ç†æŒ‡å°Žç¶±è¦ï¼ç¬¬5部:網路安全管ç†æŒ‡å¼• |
||
|
CNS 15243-3
2019 Edition Information technology – Home Electronic Systems (HES) architecture – Part 3: Communication layers 資訊技術ï¼å®¶åºé›»å系統架構ï¼ç¬¬ï¼“部:å„通信層 |
||
|
CNS 15014-5
2019 Edition Information technology - Software product evaluation - Part 5:Process for evaluators 資訊技術ï¼è»Ÿé«”產å“è©•ä¼°ï¼ç¬¬ï¼•éƒ¨ï¼šè©•ä¼°è€…éŽç¨‹ |
||
|
CNS 15014-1
2019 Edition Information technology - Software product evaluation - Part 1: General overview 資訊技術ï¼è»Ÿé«”產å“è©•ä¼°ï¼ç¬¬ï¼‘部:概觀 |
||
|
CNS 13889-2
2019 Edition Information technology – Abstract Syntax Notation One (ASN.1) :Information object specification 資訊技術ï¼æŠ½è±¡èªžæ³•è¨˜æ³•(一):資訊物件è¦æ ¼ |
||
|
CNS 15216
2019 Edition Information technology - Security techniques - Guide for the production of Protection Profiles and Security Targets 資訊技術—安全技術—產出ä¿è·å‰–繪與安全標的之指導 |
||
|
CNS 15215
2019 Edition Information technology - Security techniques - Information security incident management è³‡è¨ŠæŠ€è¡“â€”å®‰å…¨æŠ€è¡“â€”è³‡è¨Šå®‰å…¨äº‹æ•…ç®¡ç† |
||
|
CNS 15201
2019 Edition Information technology - Terminology for the Home Electronic System (HES) 資訊技術ï¼å®¶åºé›»å系統用語 |
||
|
CNS 14929-1
2019 Edition Information technology - Security techniques - Management of information and communications technology security - Part 1: Concepts and models for information and communications technology security management 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šèˆ‡é€šè¨ŠæŠ€è¡“安全管ç†ï¼ç¬¬1部:資訊與通訊技術安全管ç†æ¦‚念與模型 |
||
|
CNS 15275-4
2019 Edition Information technology − Automatic identification and data capture (AIDC) techniques − Harmonized vocabulary − Part 4: General terms relating to radio communications 資訊技術ï¼è‡ªå‹•è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術ï¼èª¿å’Œè©žå½™ï¼ç¬¬4 部:無線電通訊相關概述用語 |
||
|
CNS 15327-4
2019 Edition Information technology − Automatic identification and data capture techniques − Unique identification − Part 4: Individual products and product packages 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼å”¯ä¸€è˜åˆ¥ï¼ç¬¬4部:個別產å“åŠç”¢å“包裹 |
||
|
CNS 15275-2
2019 Edition Information technology − Automatic identification and data capture (AIDC) techniques − Harmonized vocabulary − Part 2: Optically readable media (ORM) è³‡è¨ŠæŠ€è¡“ï¼ è‡ªå‹•è˜åˆ¥èˆ‡è³‡æ–™æ“·å–æŠ€è¡“ï¼ èª¿å’Œè©žå½™ï¼ ç¬¬2部: å…‰å¸å¯è®€åª’é«” |
||
|
CNS 14992
2019 Edition Information technology - Security techniques - IT intrusion detection framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“入侵åµæ¸¬æ¡†æž¶ |
||
|
CNS 14381-1
2019 Edition Information technology - Security techniques - Key management-Part 1 : Framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬ï¼‘部:框架 |
||
|
CNS 27032
2019 Edition Information technology − Security techniques − Guidelines for cybersecurity 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ç¶²éš›å®‰å…¨æŒ‡å°Žç¶±è¦ |
||
|
CNS 15133
2019 Edition Information technology - Security techniques - Guidelines for the use and management of Trusted Third Party services 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å—信賴第三方æœå‹™çš„使用與管ç†ä¹‹æŒ‡å°Žç¶±è¦ |
||
|
CNS 14993
2019 Edition Information technology - Security techniques - Protection profile registration procedures 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¿è·å‰–ç¹ªè¨»å†Šç¨‹åº |
||
|
CNS 27014
2019 Edition Information technology − Security techniques − Governance of information security 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šå®‰å…¨æ²»ç† |
||
|
CNS 15135
2019 Edition Information technology - Security techniques - Security requirements for cryptographic modules 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å¯†ç¢¼æ¨¡çµ„安全è¦æ±‚ |
||
|
CNS 15234-3
2019 Edition Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 3: Key establishment 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼“部:金鑰建立 |
||
|
CNS 15234-4
2019 Edition Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 4: Digital signatures giving message recovery 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼åŸºæ–¼æ©¢åœ“曲線之密碼技術ï¼ç¬¬ï¼”部:具訊æ¯å¾©åŽŸä¹‹æ•¸ä½ç°½ç« |
||
|
CNS 15653
2019 Edition Information technology − Security techniques − Guidelines for information and communications technology disaster recovery services 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨Šèˆ‡é€šè¨ŠæŠ€è¡“ç½å®³å¾©åŽŸæœå‹™æŒ‡å¼• |
Find out:379Items | To Page of: First -Previous-Next -Last | 1 2 3 4 5 6 7 8 9 10 11 12 13 |