Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology-Security techniques—Anonymous entity authentication-Part 2: Mechanisms based on signatures using a group public key
|
Published |
На языке оригинала
|
4378,00
|
|
|
Information technology—Security techniques—Anonymous entity authentication—Part 4: Mechanisms based on weak secrets
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information security technology—Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information security technology—Security technical requirements and testing and evaluation approachs for operating system of smart mobile terminals
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information security technology—Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information security technology—Technology requirements for personal information protection of smart mobile terminal
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Technical requirements and testing evaluation approaches of information system security management platform products
|
Published |
На языке оригинала
|
5472,00
|
|
|
Technology requirement of mobile terminal browser software
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security technology—Smart card reader security technology requirements(EAL4+)
|
Published |
На языке оригинала
|
3744,00
|
|
|
Smart home for internet of things—Unicode of data and device
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology—Personal information security specification
|
Published |
На языке оригинала
|
3398,00
|
|
|
Information security technology—SM2 cryptographic algorithm encrypted signature message syntax specification
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—SM2 cryptographic algorithm usage specification
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Security technical requirements and testing and evaluation approaches for antivirus gateway products
|
Published |
На языке оригинала
|
4032,00
|
|
|
Information security technology—Technical requirements for mobile terminal security protection
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology—Security reference architecture of cloud computing
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security technology—Requirement and code of conduct for security testing bodies of information technology products
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology - Security technique requirements for application servers in mobile Internet
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology - Requirements and assessment methods for website identity and system security
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security technology—Public key infrastructure—Technical requirements for digital certificate based reliable electronic signature creation and verification
|
Published |
На языке оригинала
|
1786,00
|
|
Страницы: ... / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 ... / 40 |