41. Information technology. Security techniques. Evaluation criteria for IT security. Security assurance requirements Part 3, (15th February 2000) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (224 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
42. Information technology. Security techniques. Evaluation criteria for IT security. Introduction and general model Part 1, (15th February 2000) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (64 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
43. Information technology. Security techniques. Evaluation criteria for IT security. Security functional requirements Part 2, (15th February 2000) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (356 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
44. Information technology. Security techniques. Procedures for the registration of cryptographic algorithms. (15th July 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (14 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
45. Information technology. Security techniques. Guide for the production of protection profiles and security targets. (15th July 2004) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (136 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
46. Identification card systems. Telecommunications. Integrated circuit(s) cards and terminals. Payment methods Part 5, (15th September 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (26 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
47. Information technology. Security techniques. Key management. Mechanisms using asymmetric techniques Part 3, (15th January 2000) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (42 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
48. Information security management. Code of practice for information security management Part 1, (15th May 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (52 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
49. Closed-circuit television (CCTV). Management and operation. Code of practice. (15th December 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (18 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
50. Information technology. Digital compression and coding of continuous-tone still images. Registration of JPEG profiles, SPIFF profiles, SPIFF tags, SPIFF colour spaces, APPn markers, SPIFF compression types, and Registration Authorities (REGAUT) Part 4, (15th October 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (38 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗