Information technology. Business Operational View-Identification of privacy protection requirements as external constraints on business transactions
信息技术 业务运营视图
Cross References:ISO 639-2:1998(E/F)ISO 1087-1:2000(E/F)ISO/IEC 2382ISO 3166-1:2006(E/F)ISO 3166-2:2007(E/F)ISO 5127:2001(E)ISO/IEC 5218:2004(E/F)ISO/IEC 6523-1:1998(E/F)ISO/IEC 6523-2:1998(E/F)ISO/IEC 7501-1:2008(E)ISO/IEC 7501-2:1997(E)ISO/IEC 7501-3:2005(E)ISO/IEC 7812-1:2006(E)ISO/IEC 7812-2:2007(E)ISO 8601:2004(E)ISO/IEC 14662:2010(E/F)ISO/IEC 15944-1:2011(E)ISO/IEC 15944-2:2006(E)ISO/IEC 15944-4:2007(E)ISO/IEC 15944-5:2008(E)ISO/IEC 15944-7:2009(E)ISO 19108:2002(E)ISO/IEC 19501:2005(E)ISO 22857:2004(E)ISO/IEC 9798-1:1997(E)ISO/IEC 10181-2:1996(E)ISO/IEC 11179-1:2004(E)ISO/IEC 11179-3:2003(E)ISO/IEC TR 13335-1:1996(E)ISO/IEC TR 15285:1998(E)ISO 15489-1:2001(E/F)ISO/IEC 15944-6:2009(E)ISO 19115:2003(E)ISO 19135:2005(E)ISO/TS 25237:2008(E)ISO/IEC 27002:2005(E)All current amendments available at time of purchase are included with the purchase of this document.