Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Prime number generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 2:Asymmetric ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 3: Block Ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information Technology - Icon symbols and functions for controlling multimedia software applications
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Icon symbols and functions for World Wide Web browser toolbars
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental representation - Sensor representation in mixed and augmented reality
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - Mixed and augmented reality(MAR) reference model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - Live actor and entity representation in mixed and augmented reality(MAR)
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - EDCS language bindings - Part 4:C
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Spatial Reference Model(SRM) language bindings - Part 4:C
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Methodology for IT security evaluation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device performance test methods - Part 3:Test methods for tag performance
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 2:Test methods for air interface communications below 135 kHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 3:Test methodsfor air interface communications at 13.56 MHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 4:Test methods for air interface communications at 2.45 GHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 6:Test methods for air interface communications at 860~960 MHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 7:Test methods for active air interface communications at 433 MHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 66 / 67 / 68 / 69 / 70 / 71 / 72 / 73 / 74 / 75 / 76 / 77 / 78 / 79 ... / 95 |