- BIP 0071, 2013 Edition, Guidelines on Requirements and Preparation for ISMS Certification based on ISO/IEC 27001
- BIP 0072, 2013 Edition, Are you ready for an ISMS audit based on ISO/IEC 27001?
- BIP 0073, 2013 Edition, Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001
- BIP 0139, 2013 Edition, An Introduction to ISO/IEC 27001:2013
- BS EN 419211-3, 2013 Edition, Protection profiles for secure signature creation device. Device with key import
- BS EN 419211-4, 2013 Edition, Protection profiles for secure signature creation device. Extension for device with key generation and trusted channel to certificate generation application
- BS ISO/IEC 9541-1, 2012 Edition, Information technology. Font information interchange. Architecture
- BS ISO/IEC 9541-2, 2012 Edition, Information technology. Font information interchange. Interchange format
- BS ISO/IEC 19794-6, Corrigendum 2 for 2011 Edition, Information technology. Biometric data interchange formats. Iris image data
- BS ISO/IEC 20008-2, 2013 Edition, Information technology. Security techniques. Anonymous digital signatures. Mechanisms using a group public key
- BS ISO/IEC 20009-2, 2013 Edition, Information technology. Security techniques. Anonymous entity authentication. Mechanisms based on signatures using a group public key
- BS ISO/IEC 29101, 2013 Edition, Information technology. Security techniques. Privacy architecture framework
- BS ISO/IEC 30111, 2013 Edition, Information technology. Security techniques. Vulnerability handling processes
- ISO/IEC 13818-2, 3rd Edition, Information technology - Generic coding of moving pictures and associated audio information - Part 2: Video
- ISO/IEC 14496-2, Technical Corrigendum 5 for 3rd Edition, Information technology. Coding of audio-visual objects. Visual
- ISO/IEC 14496-12, Amendment 1 for 4th Edition, Amendment 1: Various enhancements including support for large metadata
- ISO/IEC 15444-1, Amendment 6 Corrected Reprint, Amendment 6: Updated ICC profile support and resolution clarification
- ISO/IEC 15444-12, Amendment 1 for 4th Edition, Amendment 1: Various enhancements including support for large metadata
- ISO/IEC 19784-2, 1st Edition Corrigendum 2, Information technology -- Biometric application programming interface -- Part 2: Biometric archive function provider interface
- ISO/IEC 19785-2, 1st Edition Corrigendum 1, Information technology -- Common Biometric Exchange Formats Framework -- Part 2: Procedures for the operation of the Biometric Registration Authority
- ISO/IEC 19785-4, 1st Edition Corrigendum 1, Information technology -- Common Biometric Exchange Formats Framework -- Part 4: Security block format specifications
- ISO/IEC 19794-2, Amendment 1 for 2nd Edition, Amendment 1: Conformance testing methodology and clarification of defects
- ISO/IEC 20008-2, 1st Edition, Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
- ISO/IEC 20009-2, 1st Edition, Information technology - Security techniques - Anonymous entity authentication - Part 2: Mechanisms based on signatures using a group public key
- ISO/IEC 20943-5, 1st Edition, Information technology - Procedures for achieving metadata registry content consistency - Part 5: Metadata mapping procedure
- ISO/IEC 20943-6, 1st Edition, Information technology - Procedures for achieving metadata registry content consistency - Part 6: Framework for generating ontologies
- ISO/IEC 23003-1, Corrigendum 4 for Amendment 2, Technical Corrigendum 4 for 1st Edition
- ISO/IEC 23008-2, 1st Edition, Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 2: High efficiency video coding
- ISO/IEC 27036-3, 1st Edition, Information technology - Security techniques - Information security for supplier relationships - Part 3: Guidelines for information and communication technology supply chain security
- ISO/IEC 29101, 1st Edition, Information technology - Security techniques - Privacy architecture framework
- ISO/IEC 29198, 1st Edition, Information technology - Biometrics - Characterization and measurement of difficulty for fingerprint databases for technology evaluation
- ISO/IEC 30111, 1st Edition, Information technology - Security techniques - Vulnerability handling processes
For similar standards, please see our Document Center List of Standards on Character Sets and Information Coding.
And you'll also want to review my previous blogs: