No products
ISO/IEC 29341-29-2 (2017-09) ISO/IEC 29341-29-2:2017 Information technology - UPnP Device Architecture - Part 29-2: Multiscreen device control protocol - Level 2 - Screen device
ISO/IEC/IEEE 24765 (2017-09) ISO/IEC/IEEE 24765:2017 Systems and software engineering - Vocabulary
ISO/IEC 30113-11 (2017-08) ISO/IEC 30113-11:2017 Information technology - Gesture-based interfaces across devices and methods - Part 11: Single-point gestures for common system actions
ISO/IEC/TR 20748-2 (2017-08) ISO/IEC TR 20748-2:2017 Information technology for learning, education and training - Learning analytics interoperability - Part 2: System requirements
ISO/IEC 30107-3 (2017-08) ISO/IEC 30107-3:2017 Information technology - Biometric presentation attack detection - Part 3: Testing and reporting
ISO/IEC 29151 (2017-08) ISO/IEC 29151:2017 Information technology - Security techniques - Code of practice for personally identifiable information protection
ISO/IEC 14543-5-8 (2017-08) ISO/IEC 14543-5-8:2017 Information technology - Home electronic systems (HES) architecture - Part 5-8: Intelligent grouping and resource sharing for HES Class 2 and Class 3 - Remote access core protocol
ISO/IEC 14543-5-9 (2017-08) ISO/IEC 14543-5-9:2017 Information technology - Home electronic system (HES) architecture - Part 5-9: Intelligent grouping and resource sharing for HES Class 2 and Class 3 - Remote access service platform
ISO/IEC 23008-1 (2017-08) ISO/IEC 23008-1:2017 Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 1: MPEG media transport (MMT)
ISO/IEC 15946-5 (2017-08) ISO/IEC 15946-5:2017 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
ISO/IEC/TR 23008-13 (2017-08) ISO/IEC TR 23008-13:2017 Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 13: MPEG media transport implementation guidelines
ISO/IEC 20009-4 (2017-08) ISO/IEC 20009-4:2017 Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets