Îáîçíà÷åíèå | Çàãëàâèå íà ðóññêîì ÿçûêå | Ñòàòóñ | ßçûê äîêóìåíòà | Öåíà (ñ ÍÄÑ 20%) â ðóáëÿõ |
|
Software engineering - Guide for the application of software life cycle to project management
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1966,00
|
|
|
Modeling guide for business process and information in e-Business
|
Published |
Íà ÿçûêå îðèãèíàëà
|
3175,00
|
|
|
Information security technology - Guidelines for the category and classification of information security incidents
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1058,00
|
|
|
XML User‘s guide
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2974,00
|
|
|
Information security technology—Guide of implementation for internet-based e-government information security—Part 1: General
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1966,00
|
|
|
Information security technology—Guide of implementation for Internet-based e-government information security—Part2: Access control and secure exchange
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1411,00
|
|
|
Information security technology—Guide of implementation for Internet-based e-government information security—Part 3: Identity authentication and authorization
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1411,00
|
|
|
Information security technology—Guide of implementation for Internet-based e-government information security—Part 4: Defense for terminal security
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1210,00
|
|
|
Information security technology - Guidelines for information security risk management
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2772,00
|
|
|
ebXML based business message - Part 1: Core item
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2369,00
|
|
|
ebXML based business message - Party 2: Core party
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1411,00
|
|
|
Information technology - Document description and processing languages - Regular language description for XML(RELAX) - Part1: RELAX Core
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2369,00
|
|
|
Supply chain management - Part 1:Overview and basic principle
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1210,00
|
|
|
Information security technology - Guideline for personal information protection within information system for public and commercial services
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1058,00
|
|
|
Cutting tool data representation and exchange - Definitions, principles and methods for reference dictionaries
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1814,00
|
|
|
Information technology - Security technology - A framework for IT security assurance - Part 1: Overview and framework
|
Published |
Íà ÿçûêå îðèãèíàëà
|
1613,00
|
|
|
Information technology - Security technology - A framework for IT security assurance - Part 2: Assurance methods
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2974,00
|
|
|
Information technology - Security technology - A framework for IT security assurance - Part 3: Analysis of assurance methods
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2974,00
|
|
|
Information security technology—Guide for the production of information system protect profile and information system security target
|
Published |
Íà ÿçûêå îðèãèíàëà
|
2570,00
|
|
|
Software engineering―Guide to the software engineering body of knowledge (SWEBOK)
|
Published |
Íà ÿçûêå îðèãèíàëà
|
7610,00
|
|
Ñòðàíèöû: ... / 143 / 144 / 145 / 146 / 147 / 148 / 149 / 150 / 151 |