Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Hash function LSH
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security for industrial automation and control systems - Part 3-2:Security risk assessment for system design
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Modes of operation for an n-bit block cipher
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Hash functions - Part 4: Hash-functions using modular arithmetic
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanism
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for protection of personally identifiable information(PII) in public clouds acting as PII processors
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Competence requirements for information security management system professionals
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security techniques - Extension to KS X ISO/IEC 27001 and KS X ISO/IEC 27002 for privacy information management - Requirements and guidelines
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for privacy impact assessment
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: 1 / 2 |