Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Hash function LSH
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security for industrial automation and control systems - Part 3-2:Security risk assessment for system design
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Blockchain and distributed ledger technologies - Reference architecture
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information security - Message authentication codes(MACs) - Part 2: Mechanisms using a dedicated hash-function
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Modes of operation for an n-bit block cipher
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Hash functions - Part 4: Hash-functions using modular arithmetic
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanism
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for protection of personally identifiable information(PII) in public clouds acting as PII processors
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: 1 / 2 |