Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques
|
Published |
На языке оригинала
|
2362,00
|
|
|
Information technology—Security techniques—Digital signatures with appendix—Part 1:General
|
Published |
На языке оригинала
|
1498,00
|
|
|
Information technology—Security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques
|
Published |
На языке оригинала
|
1613,00
|
|
|
Information security technology—Modes of operation for a block cipher
|
Published |
На языке оригинала
|
2938,00
|
|
|
Information security technology—Evaluation framework for information systems security assurance—Part 1:Introduction and general model
|
Published |
На языке оригинала
|
1498,00
|
|
|
Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion detection system
|
Published |
На языке оригинала
|
4723,00
|
|
|
Information security technology—Security technical requirements and testing assessment approaches for network vulnerability scanners
|
Published |
На языке оригинала
|
4320,00
|
|
|
Information security technology—Technical specification for network security audit products
|
Published |
На языке оригинала
|
3917,00
|
|
|
Information security technology—Risk assessment method for information security
|
Published |
На языке оригинала
|
2419,00
|
|
|
Information security technology—Guidelines for category and classification of cybersecurity incidents
|
Published |
На языке оригинала
|
2362,00
|
|
|
Information security techniques—Public key infrastructure—Security technology requirement for PKI system
|
Published |
На языке оригинала
|
2074,00
|
|
|
Information security techniques—Public key infrastructure—Security testing assessment approaches for PKI system
|
Published |
На языке оригинала
|
2650,00
|
|
|
Information security technology—Implementation guide for information security risk management
|
Published |
На языке оригинала
|
4435,00
|
|
|
Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
|
Published |
На языке оригинала
|
2880,00
|
|
|
Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways
|
Published |
На языке оригинала
|
1901,00
|
|
|
Information security techniques—Terminology
|
Published |
На языке оригинала
|
8467,00
|
|
|
Information security technology—Technical specification for network intrusion prevention system
|
Published |
На языке оригинала
|
3398,00
|
|
|
Information security technology—Technical requirements and testing and evaluating approaches for data backup and recovery products
|
Published |
На языке оригинала
|
2246,00
|
|
|
Information security technology—Technical requirements and testing and evaluating approaches of website data recovery products
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security technology—Functionality and interface specification of cryptographic support platform for trusted computing
|
Published |
На языке оригинала
|
9907,00
|
|
Страницы: 1 / 2 / 3 / 4 / 5 |