本标准规定了计算机系统中浮点运算的格式和操作。定义了异常情况,并规定了对这些情况的处理。本标准提供了一种用浮点数进行计算的方法,不管是用硬件、软件还是两者结合的方式进行处理,都会产生相同的结果。在输入数据相同的情况下,计算结果将是相同的,与实现方式无关。无论何种实现方式,数学处理中的错误和错误条件都将以一致的方式报告。
2021-06-27 20:06:27 1.77MB iso 60559 iec 754
中文名称是《中国金融集成电路(IC)卡规范-与应用无关的非接触式规范》,就是14443-1,2,3,4的中文版本,内容很全,翻译的也很准确,很不错的资料,word版
2021-06-26 17:05:13 1.9MB ISO/IEC 14443
1
ISO/IEC 27005:2011英文版BS|So/EC27005:201 so/EC27005:2011E 9.2 Risk modification 22 9. 3 Risk retention 面BB1面面 9.4 Risk avoidance 9.5 Risk sharing 10 Information security risk acceptance.. 24 11 Information security risk communication and consultation 24 12 Information security ris k monitoring and review 25 12.1 Monitoring and review of risk factors 25 12.2 Risk management monitoring, review and improvement..... 26 Annex A(informative )Defining the scope and boundaries of the information security risk management process A1 Study of the organization.. 28 A2 List of the constraints affecting the organization.. A3 List of the legislative and regulatory references applicable to the organization 31 A.4 List of the constraints affecting the scope Annex B (informative) Identification and valuation of assets and impact assessment 量国 面面国 33 B. 1 Examples of asset identification 33 B.1.1 The identification of primary assets 33 0m-0sz B12 List and description of supporting assets…………… 34 B.2 Asset va| uation.… 38 B3 Impact assessment............ n41 Annex C (informative)Examples of typical threats 42 Annex D (informative) Vulnerabilities and methods for vulnerability assessment..... D1 Examples of vulnerabilities 45 D2 Methods for assessment of technical vulnerabilities n…48 Annex E(informative)Information security risk assessment approaches 50 E.1 High-level information security risk assessment.……… 50 E2 Detailed information security risk assessment...-............. E22 Example2 Ranking of Threats by Measures of RisK.……… 51 E.2.1 Example 1 Matrix with predefined values 52 E.2.3 Example 3 Assessing a value for the likelihood and the possible consequences of risks... 54 Annex F(informative) Constraints for risk modification.. 面 56 Annex G(informative) Differences in definitions between ISO/EC 27005: 2008 and ISo/EC 27005:2011 58 Bibliography 68 O ISO/EC 2011-All rights reserved BS ISO/EC27005:2011 ISO/EC270
2021-06-23 16:00:18 854KB ISO IEC 27005 2011
1
包括标准 16269-4,6,7,8,具体时间:2010,2014,2001,2004;文件格式为**加密了的** PDF。
2021-06-22 11:06:49 3.21MB ISO标准
ISO-IEC 14443-1--4_EN.rar
2021-06-22 10:54:01 2.75MB ISO IEC 14443 1--4
1
ISO+IEC+7816-1-1998.pdf ISO+IEC+7816-2-1999.pdf ISO+IEC+7816-3-2006.pdf ISO+IEC+7816-4-1995.pdf ISO+IEC+7816-5-1994.pdf ISO+IEC+7816-6-1996.pdf
2021-06-22 10:33:31 8.92MB ISO IEC 7816 1--6
1
里面主要包括了 ISO/IEC 5725 的标准,注意,里面不是最新版的标准(包括 5725-1 到 6)。
2021-06-21 18:12:32 12.96MB ISO/IEC 5725
ISO IEC 13818-1 2000.pdf TS流 ISO 标准,可复制文字,带书签
2021-06-16 18:03:45 1.51MB ISO IEC,TS
1
完整英文电子版ISO/IEC/IEEE 26512:2017 Systems and software engineering — Requirements for acquirers and suppliers of information for users(系统和软件工程 - 对用户信息的获取者和提供者的要求)。本文件概述了与为用户获取和提供信息相关的信息管理过程。 它将协议流程(获取和供应)应用于用户信息,并解决了对这些信息的要求的准备。 这些要求是本文档中讨论的用户规范和工作说明信息的核心。 本文件还解决了对采购和供应过程的主要文件输出的要求:征求建议书和文件产品和服务建议书。本文档旨在用于为用户获取或提供任何类型的信息,并且独立于信息开发或管理工具或方法。
2021-06-16 18:03:02 633KB iso 26512 软件工程 用户信息