Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Radio frequency identificationfor item management - Part 7:Parameters for active airinterface communications at 433 MHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio Frequency Identification(RFID)for item management - Application requirements profiles
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Imformation technology - Automatic identification and data capture techniques - Bar code symbology - QR Code
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping services - Part 1:Framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping service - Part 3: Mechanisms producing linked tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - IT network security - Part 3:Securing communications between networks using security gateways
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - IT network security - Part 5:Securing communications across networks using virtual private networks
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Random bit generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Prime number generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 2:Asymmetric ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 3: Block Ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Methodology for IT security evaluation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device performance test methods - Part 3:Test methods for tag performance
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 2:Test methods for air interface communications below 135 kHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 3:Test methodsfor air interface communications at 13.56 MHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 4:Test methods for air interface communications at 2.45 GHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Radio frequency identification device conformance test methods - Part 6:Test methods for air interface communications at 860~960 MHz
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 ... / 19 |