17704692435
有电子文本×
购买标准后,可去我的标准下载或阅读

Details of the use of this proforma is provided in this Recommendation | Part of ISO/IEC 10026.

   电子版:546元 / 折扣价: 465

The following are within the scope of this International Standard: the syntax of the Z notation; the type system of the Z notation; the semantics of the Z notation; a toolkit of widely used mathematical operators; L A T E X [10] and e-mail mark-up.

   电子版:1056元 / 折扣价: 898

This International Standard defines the command set extensions for SCSI storage array devices; commonly known as RAID devices. This standard is principally intended to be used in conjunction with, not as an alternate to, any of the SCSI command standards nor to the SCSI-3 Architecture Model (ISO/IEC 14776-411) standard. This international standard is intended as an alternate to the SCSI-3 Controller Command (ISO/IEC 14776-341) standard. The resulting commands facilitate the control and configuration of SCSI storage arrays and thus provide a common command specification for both system integrators and suppliers of SCSI storage array devices.

This international standard contains all the information defined in SCSI-3 Controller Command (ISO/IEC 14776-341) standard. In addition this international standard specifies new commands and an expanded model clause.

The clause(s) of this standard pertaining to the SCSI storage array device class, implemented in conjunction with the applicable clauses within any of the SCSI command standards, shall specify the standard command set available for SCSI storage arrays.

The objective of the SCSI Controller Commands is to provide the following:

  • Transfer commands unique to SCSI Controller Command devices;
  • Control commands to manage the operation of an SCSI Controller Command device;
  • Optional device mapping and pass-through support.

   电子版:1500元 / 折扣价: 1276

Establishes a mechanism for measuring the core algorithmic capabilities of biometric comparison algorithms running on ISO/IEC 7816 integrated circuit cards. Specifically, the standard instantiates a mechanism for on-card biometric comparison testing; standardizes procedures for the measurement of the accuracy of on-card biometric comparison implementations running on object-based, test-specific sample cards; standardizes procedures for the measurement of durations of the various operations; and gives examples for matching ISO/IEC 19794-2:2005 compact card minutiae templates.

   电子版:546元 / 折扣价: 465

This document specifies data formats for both transport and storage of genomic information, including the conversion process.

   电子版:1358元 / 折扣价: 1155

Presents basic concepts and phases of information security incident management and combines these concepts with principles in a structured approach to detecting, reporting, assessing, and responding to incidents, and applying lessons learnt.

   电子版:684元 / 折扣价: 582

Specifies requirements for embossed characters on identification cards. The embossed characters are intended for transfer of data either by use of imprinters or by visual or machine reading. It takes into consideration both human and machine aspects and states minimum requirements. It is the purpose of this document to provide criteria to which cards shall perform. No consideration is given within this document to the amount of use, if any, experienced by the card prior to test. Failure to conform to specified criteria is negotiated between the involved parties.ISO/IEC 10373-1 specifies the test procedures used to check cards against the parameters specified in this document.

   电子版:902元 / 折扣价: 767

Specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. Four of these mechanisms are improved versions of mechanisms specified in ISO/IEC 9798-6:2005 since they use less user input and achieve more security. Such mechanisms can be appropriate in a variety of circumstances where there is no need for an existing public key infrastructure, shared secret keys or passwords. One such application occurs in personal networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the process of preparing them for use in the network. These mechanisms can also be used to support key management functions.

   电子版:738元 / 折扣价: 628

Fibre Channel Avionics Environment (FC-AE), Technical Report INCITS TR-31-2002 [2], is a group of protocols and profiles that specify Fibre Channel options for devices connected by fabric and/or loop topologies that are pertinent to their use in commercial and military aerospace industries. The primary areas of interest include avionic command, control, instrumentation, simulation, signal processing, and sensor/video data distribution. These application areas are characterized by a variety of requirements, among them a need for high reliability, fault tolerance, and deterministic behavior to support real-time control/response.

The FC-AE-2 task group determined that it was best to allow profiles defined in the FC-AE technical report to be updated independently. This technical report is the first update to the FC-AE-ASM protocol since FC-AE was released. This technical report is recommended for new designs, but does not obsolete clause 4.1 in INCITS TR-31-2002 [2].

The primary objective of this technical report is to maximize the likelihood of interoperability between conforming implementations. This technical report Prohibits or Requires features that are optional and Prohibits the use of some non-optional features in the referenced ANSI INCITS standards. A second objective of this technical report is to simplify implementations and their associated documentation, testing, and support requirements. This technical report does not define internal characteristics of conformant implementations. This technical report incorporates features from the referenced ANSI INCITS standards.

   电子版:570元 / 折扣价: 485

2969 条记录,每页 10 条,当前第 21 / 297 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页  
  • 波浪
  • 波浪
  • 波浪
  • 波浪