Information technology. Business operational view. Identification and referencing of requirements of jurisdictional domains as sources of external constraints— 244 стр.
Information technology. Security techniques. Management of information and communications technology security. Concepts and models for information and communications technology security management— 38 стр.
Financial transaction card originated messages -- Interchange message specifications -- Part 3: Maintenance procedures for messages, data elements and code values— 16 стр.
Information technology - Structure for the identification of organizations and organization parts - Part 2: Registration of organization identification schemes— 11 стр.
Information technology - Structure for the identification of organizations and organization parts - Part 1: Identification of organization identification schemes— 12 стр.