INTERNATIONAL STANDARD lSO/IEC 10857 ANSI/IEEE Std 896.1 First edition 1994-04-27 Information technology - Microproce...
Reference numberISO/IEC 14519:2001(E)IEEEStd 1003.5, 1999 editionINTERNATIONALSTANDARDISO/IEC14519IEEEStd 1003.5Second edit...
Reference numberISO/IEC 14496-4:2004/Amd.8:2005(E)© ISO/IEC 2005 INTERNATIONAL STANDARD ISO/IEC14496-4Second edition2004-...
INTERNATIONAL STANDARD ISOIIEC 10089 First edition 1991-05-01 Information technology - 130 mm rewritable optical dis...
INTERNATIONAL STANDARD ISO/IEC 14496-26:2010TECHNICAL CORRIGENDUM 3 Published 2011-05-15 INTERNATIONAL ORGANIZATION FOR...
INTERNATIONAL STANDARD ISO/IEC 10025-3:1993 TECHNICAL CORRIGENDUM 1 Published 1995-12-01 INTERNATIONAL ORGANIZATION FOR...
Identification cards — Optical memory cards — Linear recording method —Part 5: Data format for information inte...
INTERNATIONAL STANDARD ISO/IEC 14496-5:2001/Amd.27:2011TECHNICAL CORRIGENDUM 1 Published 2015-04-01 INTERNATIONAL ORGANIZ...
Information security — Non-repudiation —Part 3: Mechanisms using asymmetric techniquesSécurité de l'information —...
ISO/IEC 14543-5-5 Edition 1.0 2012-02 INTERNATIONAL STANDARD Information technology – Home electronic system (HES) ...
COPYRIGHT NOTICE & TERMS OF USE This document is the copyright of the Publisher. All rights reserved. The contra...
ISO IEC 14772-1-1997.zip
Cards and security devices for personal identification — Contactless proximity objects —Part 4: Transmission proto...
INTERNATIONAL STANDARD ISO/IEC14776-115 First edition2004-11 Information technology – Small computer system interface...
INTERNATIONALSTANDARDISO/IEC14763-1First edition1999-10Information technology –Implementation and operation ofcustomer pre...
INTERNATIONAL STANDARD ISOIIEC 13549 First edition 1993-12-15 Information technology - Data interchange on 130 mm O...
ICS 35.040 Ref. No. ISO/IEC 11544:1993/Cor.2:2001(E)© ISO/IEC 2001 – All rights reserved Printed in Switzerland I...
ISO IEC 14496-5-2001 amd10-2007 cor3-2009.zip
Information technology — Security techniques — Key management —Part 4: Mechanisms based on weak secretsAMENDMENT...
ISO IEC 14496-5-2001 amd16-2008.zip

