Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Cybersecurity technology—Entity authentication—Part 2: Mechanisms using authenticated encryption
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques
|
Published |
На языке оригинала
|
2822,00
|
|
|
Cybersecurity technology—Entity authentication—Part 4: Mechanisms using a cryptographic check function
|
Published |
На языке оригинала
|
1786,00
|
|
|
Cybersecurity technology—Message authentication codes (MACs)—Part 2: Mechanisms using a dedicated hash-function
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information technology—Security techniques—Digital signatures with appendix—Part 1:General
|
Published |
На языке оригинала
|
1786,00
|
|
|
Cybersecurity technology—Non-repudiation—Part 1: General
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information technology—Security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques
|
Published |
На языке оригинала
|
2189,00
|
|
|
Cybersecurity technology—Non-repudiation—Part 3: Mechanisms using asymmetric techniques
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Modes of operation for a block cipher
|
Published |
На языке оригинала
|
4032,00
|
|
|
Cybersecurity technology—Hash-functions—Part 1: General
|
Published |
На языке оригинала
|
1786,00
|
|
|
Cybersecurity technology—Hash-functions—Part 2: Hash-functions using a block cipher
|
Published |
На языке оригинала
|
2822,00
|
|
|
Cybersecurity technology—Hash-functions—Part 3: Dedicated hash-functions
|
Published |
На языке оригинала
|
1670,00
|
|
|
Cybersecurity technology—Evaluation criteria for IT security—Part 1: Introduction and general model
|
Published |
На языке оригинала
|
10310,00
|
|
|
Cybersecurity technology—Evaluation criteria for IT security—Part 2: Security functional components
|
Published |
На языке оригинала
|
12730,00
|
|
|
Cybersecurity technology—Evaluation criteria for IT security—Part 3: Security assurance components
|
Published |
На языке оригинала
|
10829,00
|
|
|
Cybersecurity technology—Evaluation criteria for IT security—Part 4:Framework for specification of evaluation methods and activities
|
Published |
На языке оригинала
|
2822,00
|
|
|
Cybersecurity technology—Evaluation criteria for IT security—Part 5:Pre-defined packages of security requirements
|
Published |
На языке оригинала
|
3398,00
|
|
|
Information security technology—Evaluation framework for information systems security assurance—Part 1:Introduction and general model
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion detection system
|
Published |
На языке оригинала
|
5472,00
|
|
|
Information security technology—Security technical requirements and testing assessment approaches for network vulnerability scanners
|
Published |
На языке оригинала
|
5587,00
|
|
Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 |