Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information security technology—Controllability evaluation index for security of information technology products—Part 4: Office suite
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Controllability evaluation index for security of information technology products—Part 5: General purpose computer
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Time stamp policy and time stamp practice rules
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technologyпјЌFormat specifications for citizen cyber electronic identity
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Technical guide for identity authentication over network
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information security technology-Basic requirements and implementation guide of network security monitoring
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Guidelines for the information and communication technology supply chain risk management
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology—Trusted computing specification—Trusted support platform for server
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information technologyпјЌSibe nominal characters, presentation characters and use rules of controlling characters
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security technology—Cyber security threat information format
|
Published |
На языке оригинала
|
3398,00
|
|
|
Information security technology—Methods for obtaining security attestations for digital signature applications
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information technologyпјЌManchu nominal characters, presentation characters and use rules of controlling characters
|
Published |
На языке оригинала
|
3744,00
|
|
|
Information technologyпјЌTodo nominal characters, presentation characters and use rules of controlling characters
|
Published |
На языке оригинала
|
4954,00
|
|
|
Information security techniques—Biometric authentication protocol framework based on trusted environment
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information security technology—Security technical requirements of smart card (EAL4+)
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology—Security technical requirements for application of sensing terminals in internet of things
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology —Requirements for disaster recovery service
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information security technology—Technical requirements of security management center for classified protection of cybersecuriy
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology —Capability requirements and evaluation specification for assessment organization of classified protection of cybersecurity
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology —Authentication and authorization—Access control middleware framework and interface
|
Published |
На языке оригинала
|
4032,00
|
|
Страницы: ... / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 / 34 / 35 / 36 / 37 ... / 40 |