Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for cybersecurity
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 3:Reference networking scenarios - Threats, design techniques and control issues
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security incident management
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Privacy framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 9:Vascular image data
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Entity authentication assurance framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Verification of cryptographic protocols
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Signcryption
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Privacy capability assessment model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Requirements for partially anonymous, partially unlinkable authentication
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Lightweight cryptography - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - JPEG XR image coding system - Part 2:Image coding specification
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Biometric presentation attack detection - Part 1:Framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s - Part 5:Software simulation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 |