Search Standards
Loading facets. please wait
(4404)
(10)
(0)
(2207)
(2204)
(3)
(0)
(0)
(4414)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
Filtering your results. please wait...
GSO ISO/IEC 5392:2025
ISO/IEC 5392:2024
Gulf Standard
Information technology — Artificial intelligence — Reference architecture of knowledge engineering
GSO ISO/IEC 19770-6:2025
ISO/IEC 19770-6:2024
Gulf Standard
Information technology — IT asset management — Part 6: Hardware identification tag
GSO ISO/IEC 4005-3:2025
ISO/IEC 4005-3:2023
Gulf Standard
Telecommunications and information exchange between systems — Unmanned aircraft area network (UAAN) — Part 3: Physical and data link protocols for control communication
GSO ISO/IEC 30179:2025
ISO/IEC 30179:2023
Gulf Standard
Internet of Things (IoT) — Overview and general requirements of IoT system for ecological environment monitoring
GSO ISO 18128:2025
ISO 18128:2024
Gulf Standard
Information and documentation — Records risks — Risk assessment for records management
GSO ISO/IEC TR 5891:2025
ISO/IEC TR 5891:2024
Gulf Standard
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
GSO ISO/IEC 30137-1:2025
ISO/IEC 30137-1:2024
Gulf Standard
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and specification
GSO ISO/IEC 29100:2025
ISO/IEC 29100:2024
Gulf Standard
Information technology — Security techniques — Privacy framework
GSO ISO/IEC TS 20000-5:2025
ISO/IEC TS 20000-5:2022
Gulf Standard
Information technology — Service management — Part 5: Implementation guidance for ISO/IEC 20000-1
GSO ISO/IEC/IEEE 42010:2025
ISO/IEC/IEEE 42010:2022
Gulf Standard
Software, systems and enterprise — Architecture description
GSO ISO/IEC 10373-1:2025
ISO/IEC 10373-1:2020
Gulf Standard
Cards and security devices for personal identification — Test methods — Part 1: General characteristics
GSO ISO/IEC 18033-7:2025
ISO/IEC 18033-7:2022
Gulf Standard
Information security — Encryption algorithms — Part 7: Tweakable block ciphers