Friday, June 20, 2014

New Information Technology - Character sets and information coding - Standards for the 1st Quarter 2014

Document Center Inc. is pleased to announce that the following New Standards on Information Technology - Character sets and information coding - are now available:


  • BIP 0141, 2013 Edition, ISO 27001:2013 ISMS Stand alone Documentation Toolkit
  • ISO/IEC 14496-1, Amendment 2 for Edition 4.0, Amendment 2 - Information technology -- Coding of audio-visual objects -- Part 1: Support for raw audio-visual data
  • ISO/IEC 14496-3, Amendment 4 for Edition 4.0, Amendment 4 - Information technology -- Coding of audio-visual objects -- Part 3: Audio - New levels for AAC profiles
  • ISO/IEC 14496-12, Amendment 2 for Edition 4.0, Amendment 2 - Information technology -- Coding of audio-visual objects -- Part 12: ISO base media file format - Carriage of timed text and other visual overlays
  • ISO/IEC 14496-16, Amendment 2 for Edition 4.0, Amendment 2 - Information technology -- Coding of audio-visual objects -- Part 16: Animation Framework eXtension (AFX) - Multi-resolution 3D mesh compression
  • ISO/IEC 14496-26, Amendment 3 for Edition 1.0, Amendment 3 - Information technology -- Coding of audio-visual objects -- Part 26: Audio conformance - Conformance for Low Delay AAC v2 profile
  • ISO/IEC 14496-30, 1st Edition, Information technology - Coding of audio-visual objects - Part 30: Timed text and other visual overlays in ISO base media file format
  • ISO/IEC 15408-1, 3rd Edition Corrected Reprint, Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
  • ISO/IEC 15444-9, Amendment 5 for Edition 1.0, Amendment 5 - Information technology -- JPEG 2000 image coding system: Interactivity tools, APIs and protocols - UDP transport and additional enhancements to JPIP
  • ISO/IEC 15444-12, Amendment 2 for Edition 4.0, Amendment 2 - Information technology -- JPEG 2000 image coding system -- Part 12: ISO base media file format - Carriage of timed text and other visual overlays
  • ISO/IEC 15946-1, Corrigendum 2 for Edition 2.0, Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
  • ISO/IEC 18045, 2nd Edition Corrected Reprint, Information technology - Security techniques - Methodology for IT security evaluation
  • ISO/IEC 19794-5, Amendment 1 for Edition 2.0, Information technology - Biometric data interchange formats - Part 5: Face image data - Amendment 1: Conditions for taking photographs for face image data
  • ISO/IEC 19794-7, 2nd Edition, Information technology - Biometric data interchange formats - Part 7: Signature/sign time series data
  • ISO/IEC 19794-8, Amendment 1 Corrected Reprint, AMENDMENT 1: Conformance testing methodology, Part 8: finger pattern skeletal data, Information technology - Biometric data interchange formats
  • ISO/IEC 20008-1, 1st Edition, Information technology - Security techniques - Anonymous digital signatures - Part 1: General
  • ISO/IEC 23000-10, Corrigendum 2 for 2nd Edition, Information technology - Multimedia application format (MPEG-A) - Part 10: Surveillance application format
  • ISO/IEC 23003-3, Amendment 1 for 1st Edition, Amendment 1 - Information technology -- MPEG audio technologies -- Part 3: Unified speech and audio coding - Conformance
  • ISO/IEC-23005-1, 2nd Edition, Information technology - Media context and control - Part 1: Architecture
  • ISO/IEC 23005-7, 2nd Edition, Information technology - Media context and control - Part 7: Conformance and reference software
  • ISO/IEC 24730-1, 2nd Edition, Information technology - Real-time locating systems (RTLS) - Part 1: Application programming interface (API)
  • ISO/IEC 24759, 2nd Edition, Information technology - Security techniques - Test requirements for cryptographic modules
  • ISO/IEC 24791-3, 1st Edition, Information technology - Radio frequency identification (RFID) for item management - Software system infrastructure - Part 3: Device management
  • ISO/IEC 27000, 3rd Edition, Information technology - Security techniques - Information security management systems - Overview and vocabulary
  • ISO/IEC 27016, 1st Edition, Information technology - Security techniques - Information security management - Organizational economics
  • ISO/IEC 27033-4, 1st Edition, Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways
  • ISO/IEC 27034-1, Corrigendum 1 for 1st Edition, Information technology - Security techniques - Application security - Part 1: Overview and concepts
  • ISO/IEC 27036-1, 1st Edition, Information technology - Security techniques - Information security for supplier relationships - Part 1: Overview and concepts
  • ISO/IEC 27038, 1st Edition, Information technology - Security techniques - Specification for digital redaction
  • ISO/IEC 29150, Corrigendum 1 for 1st Edition, Information technology - Security techniques - Signcryption
  • IEC 61937-6, Edition 2.1 (consolidates the Edition 2.0 with Amendment 1), Information technology - Security techniques - Signcryption



You'll also want to review my two previous blogs: