321. Information technology. Guidelines for the management of IT security. Concepts and models for IT Security Part 1, (15th September 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (24 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
322. Information technology.Security techniques.Hash-functions. General Part 1, (15th March 1995) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (12 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
323. Information technology. International Standardized Profiles ADYnn. OSI Directory. ADY43. DSA to DSA authentication Part 7, (15th April 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (52 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
324. Information technology. Security techniques. Privacy architecture framework. (31st March 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (58 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
325. BS EN 15713. Secure destruction of confidential material. Code of practice. (24th March 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (41 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
326. Information security. Cryptographic techniques based on elliptic curves. Elliptic curve generation Part 5, (8th April 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (44 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
327. BS EN ISO 21177. Intelligent transport systems. ITS station security services for secure session establishment and authentication between trusted devices. (21st April 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (113 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
328. Tracked Changes. Information security. Cryptographic techniques based on elliptic curves. Elliptic curve generation Part 5, (27th April 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (94 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
329. Tracked Changes. Information security. Message authentication codes (MACs). Mechanisms using a dedicated hash-function Part 2, (3rd May 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (152 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
330. Tracked Changes. Information security, cybersecurity and privacy protection. Biometric information protection. (6th May 2022) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (174 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗