21. Information technology. Security techniques. Digital signatures with appendix. General Part 1, (15th April 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (20 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
22. Information technology. Security techniques. Non-repudiation. Mechanisms using asymmetric techniques Part 3, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (16 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
23. Recommendations for names for chemicals used in industry. (31st January 1984) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (36 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
24. Nuclear instrumentation. A review of the application of IEC 60880:1986. (15th January 1999) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (24 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
25. Information technology. Security techniques. Non-repudiation. General Part 1, (15th December 1998) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (24 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
26. Information technology. Open systems interconnection. LOTOS description of the session service. (31st October 1990) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (60 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
27. Information technology. Open systems interconnection. LOTOS description of the session protocol. (30th November 1990) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (94 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
28. Method for specifying requirements for a FORTRAN language processor. (31st December 1987) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (32 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
29. Information technology. Security techniques. Digital signatures with appendix. Identity-based mechanisms Part 2, (15th March 2000) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (22 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
30. Systems and software engineering. Systems and software quality requirements and evaluation (SQuaRE). Quality requirements framework. (9th September 2019) Authors: British Standards Institution, Record Type: Book Extent: 1 online resource (58 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗