Information Technology. Expanded business process map for telecommunications operators (eTOM). B2B INTEGRATION: USE OF B2B ENTERPRISES INTEGRATION BASED ON eTOM
|
Information technologies protection against unauthorized access to information software of information security tools classification according to the level of control of the absence of undeclared capabilities
|
Information technology security methods Guidelines for auditing information management systems
|
Information Technology. Methods to ensure protection. Vulnerability disclosure
|
Information technology methods and means of ensuring security basics of confidence in security part 1 introduction and basic concepts
|
Information technology security methods guide for the production of security profiles and security targets
|
Information Technology Service Management Part 10 CONCEPTS AND TERMINOLOGY
|
Information Technology Service Management Part 5 EXAMPLE IMPLEMENTATION PLAN ISO / IEC 20000-1
|
Measuring instruments controlled by software. General requirements
|