
发布时间:2024-05-27 17:49:26 - 更新时间:2024年06月29日 15:22
点击量:0
本标准规定了安全防范网络摄像机(以下简称摄像机)的术语、定义和缩略语、基本要求、技术要求、试验方法、检验规则、标志、包装、运输和贮存、质量保证。 本标准适用于安全防范网络视频监控系统中使用的网络摄像机,其他领域应用的摄像机可参考采用
Network camera used in security video surveillance
Adopts ISO/IEC 18028-1:2006 to align the Australian approach to network-security with worlds best practice
Information technology - Security techniques - IT network security - Network security management
Provides direction with respect to networks and communications, including on the security aspects of connecting information system networks themselves
Information technology - Security techniques - IT network security Part 1: Network security management
Information technology-Security techniques-IT network security-Part 1:Network security management
Information technology-Security techniques-IT network security-Part 1:Network security management
ISO/IEC 18028-1 provides direction with respect to networks and communications, including on the security aspects of connecting information system
Information technology - Security techniques - IT network security - Part 1: Network security management
Adopts ISO/IEC 18028-5:2008 to align Australian procedures for securing communications across VPN (Virtual Private Networks
Information technology - Security techniques - IT network security - Securing communications across networks using virtual private networks
Information technology. Security techniques. IT network security. Part 1. Network security management
Information security technology—Security requirements for network switch
Information technology-Security techniques-IT network security-Part 2:Network security architecture
Information technology-Security techniques-IT network security-Part 2:Network security architecture
Information technology. Security techniques. Network security. Securing wireless IP network access
Provides detailed direction with respect to the security aspects of using Virtual Private Network (VPN) connections to inter-connect networks
Information technology - Security techniques - IT network security Part 5: Securing communications across networks using virtual private networks
Information technology - Security techniques - IT network security - Part 3 : Securing communications between networks using security gateways
Information technology-Security techniques-IT network security-Part 3:Securing communications between networks using security gateways
本标准规定了安全防范网络摄像机(以下简称摄像机)的术语、定义和缩略语、基本要求、技术要求、试验方法、检验规则、标志、包装、运输和贮存、质量保证。 本标准适用于安全防范网络视频监控系统中使用的网络摄像机,其他领域应用的摄像机可参考采用
Network camera used in security video surveillance
Adopts ISO/IEC 18028-1:2006 to align the Australian approach to network-security with worlds best practice
Information technology - Security techniques - IT network security - Network security management
Provides direction with respect to networks and communications, including on the security aspects of connecting information system networks themselves
Information technology - Security techniques - IT network security Part 1: Network security management
Information technology-Security techniques-IT network security-Part 1:Network security management
Information technology-Security techniques-IT network security-Part 1:Network security management
ISO/IEC 18028-1 provides direction with respect to networks and communications, including on the security aspects of connecting information system
Information technology - Security techniques - IT network security - Part 1: Network security management
Adopts ISO/IEC 18028-5:2008 to align Australian procedures for securing communications across VPN (Virtual Private Networks
Information technology - Security techniques - IT network security - Securing communications across networks using virtual private networks
Information technology. Security techniques. IT network security. Part 1. Network security management
Information security technology—Security requirements for network switch
Information technology-Security techniques-IT network security-Part 2:Network security architecture
Information technology-Security techniques-IT network security-Part 2:Network security architecture
Information technology. Security techniques. Network security. Securing wireless IP network access
Provides detailed direction with respect to the security aspects of using Virtual Private Network (VPN) connections to inter-connect networks
Information technology - Security techniques - IT network security Part 5: Securing communications across networks using virtual private networks
Information technology - Security techniques - IT network security - Part 3 : Securing communications between networks using security gateways
Information technology-Security techniques-IT network security-Part 3:Securing communications between networks using security gateways








