17704692435
有电子文本×
购买标准后,可去我的标准下载或阅读

The SCSI protocol is designed to provide an efficient peer-to-peer I/O bus with the maximum number of hosts and peripherals determined by the bus width (8 or 16). Data may be transferred asynchronously or synchronously at rates that depend primarily on device implementation and cable length. SCSI is an I/O interface that may be operated over a wide range of media and transfer rates. This standard defines a Fibre Channel mapping layer (FC-4) that uses the services, Fibre Channel Framing and Signaling Interface (FC-FS) to transmit SCSI command, data, and status information between a SCSI initiator and a SCSI target. The use of this standard enables the transmission of standard SCSI command formats, the transmission of standard SCSI data and parameter strings, and the receipt of SCSI status and sense information across the Fibre Channel using only the standard Fibre Channel frame and sequence formats. The Fibre Channel protocol operates with Fibre Channel Classes of Service 1, 2, and 3 and operates across Fibre Channel fabrics and arbitrated loops.

   电子版:1479元 / 折扣价: 1258

ISO/IEC 27033-5:2013 gives guidelines for the selection, implementation, and monitoring of the technical controls necessary to provide network security using Virtual Private Network (VPN) connections to interconnect networks and connect remote users to networks.

   电子版:532元 / 折扣价: 453

This part of ISO 7487 specifies the quality of recorded signals, the track layout, and a track format to be used on such a flexible disk cartridge, which is intended for data interchange between data processing systems.

   电子版:546元 / 折扣价: 465

Specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party. The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.

   电子版:546元 / 折扣价: 465

Covers the manual and automated management of keying material used for financial services such as point-of-sale (POS) transactions (debit and credit), automated teller machine (ATM) transactions, messages among terminals and financial institutions, and interchange messages among acquirers, switches and card issuers. It deals exclusively with management of symmetric keys using symmetric techniques, and specifies the minimum requirements for the management of keying material. Since last publication, this standard has undergone significant modifications in structure and content, including considerations related to the use of the AES algorithm. Implementation details for DUKPT have been moved to part three of X9.24. Addressed herein are activities and requirements related to each stage or event within the key life cycle including generation, distribution, utilization, storage, archiving, replacement and destruction of the keying material. An institution's key management process is not to be implemented or controlled in a manner that has less security, protection, or control than described herein. It is intended that two nodes, if they implement compatible versions of: the same secure key management method, the same secure key identification technique approved for a particular method, and the same key separation methodologies in accordance with this part of this standard, will be interoperable at the application level. Other characteristics may be necessary for node interoperability; however, this part of this standard does not cover such characteristics as message format, communications protocol, transmission speed, or device interface.

   电子版:1274元 / 折扣价: 1083

Different users of information technology products possess different sets of abilities. Some abilities may not ever be present in a user as they may have been born without them. Some abilities are acquired, developed or deteriorate over time due to education, maturity, injury, illness or age. Just as it is possible that a user possesses a combination of abilities, it is also possible that they may lack a combination of abilities.

ISO/IEC TR 19765:2007 presents icons and symbols currently used to provide access to facilities and tools to support the needs of elderly and disabled users of information technology (IT) products, and could form the basis of a future International Standard which would provide a recommended collection of icons and symbols.

These icons and symbols have been collected from a variety of sources including other standards, contemporary software products, web sites and hardware devices. These sources are cross-referenced and listed in a bibliography.

The icons and symbols presented in ISO/IEC TR 19765:2007 are categorized by modality and method of use.

   电子版:931元 / 折扣价: 792

The revision contains substantive and editorial changes to INCITS 137:1988. The standard specifies the general, physical and magnetic requirements for inter-changeability of the one-and two-sided 90mm (3.5 in) (nominal) flexible disk cartridge (for 7958 bits-per-radian (bpr) use) as required to achieve unformatted disk cartridge interchange among disk drives using 80 tracks per side and associated information processing systems.

   电子版:570元 / 折扣价: 485

2969 条记录,每页 10 条,当前第 7 / 297 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页  
  • 波浪
  • 波浪
  • 波浪
  • 波浪