• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Cyber Security (CYBER); Software Bill of Materials (SBOM) Compendium

ETSI TR 104 034 V1.1.1

Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025

ETSI - European Telecommunications Standards Institute

URI: http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347580
Subject: Cybersecurity
Collections :
  • ETSI - European Telecommunications Standards Institute
  • Download PDF : (1.203Mb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Cyber Security (CYBER); Software Bill of Materials (SBOM) Compendium

Show full item record

contributor authorETSI - European Telecommunications Standards Institute
date accessioned2025-09-30T22:59:51Z
date available2025-09-30T22:59:51Z
date copyright2025.05
date issued2025
identifier othertr_104034v010101p.pdf
identifier urihttp://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347580
languageEnglish
publisherETSI - European Telecommunications Standards Institute
titleCyber Security (CYBER); Software Bill of Materials (SBOM) Compendiumen
titleETSI TR 104 034 V1.1.1num
typestandard
page21
statusPublished
treeETSI - European Telecommunications Standards Institute:;2025
contenttypefulltext
subject keywordsCybersecurity
subject keywordsresilience
scopeThis Technical Report identifies Software Bill of Material challenges, types, existing specifications, existing tools and cybersecurity uses, including compliance obligations (e.g., regulatory or contractual) . The report will identify gaps and make recommendations for further work.
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian