Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques
|
Published |
На языке оригинала
|
2066,00
|
|
|
Information technology—Security techniques—Digital signatures with appendix—Part 1:General
|
Published |
На языке оригинала
|
1310,00
|
|
|
Information technology—Security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques
|
Published |
На языке оригинала
|
1411,00
|
|
|
Information security technology—Modes of operation for a block cipher
|
Published |
На языке оригинала
|
2570,00
|
|
|
Information security technology—Evaluation framework for information systems security assurance—Part 1:Introduction and general model
|
Published |
На языке оригинала
|
1310,00
|
|
|
Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion detection system
|
Published |
На языке оригинала
|
4133,00
|
|
|
Information security technology—Security technical requirements and testing assessment approaches for network vulnerability scanners
|
Published |
На языке оригинала
|
3780,00
|
|
|
Information security technology—Technical specification for network security audit products
|
Published |
На языке оригинала
|
3427,00
|
|
|
Information security technology—Risk assessment method for information security
|
Published |
На языке оригинала
|
2117,00
|
|
|
Information security technology—Guidelines for category and classification of cybersecurity incidents
|
Published |
На языке оригинала
|
2066,00
|
|
|
Information security techniques—Public key infrastructure—Security technology requirement for PKI system
|
Published |
На языке оригинала
|
1814,00
|
|
|
Information security techniques—Public key infrastructure—Security testing assessment approaches for PKI system
|
Published |
На языке оригинала
|
2318,00
|
|
|
Information security technology—Implementation guide for information security risk management
|
Published |
На языке оригинала
|
3881,00
|
|
|
Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
|
Published |
На языке оригинала
|
2520,00
|
|
|
Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways
|
Published |
На языке оригинала
|
1663,00
|
|
|
Information security techniques—Terminology
|
Published |
На языке оригинала
|
7409,00
|
|
|
Information security technology—Technical specification for network intrusion prevention system
|
Published |
На языке оригинала
|
2974,00
|
|
|
Information security technology—Technical requirements and testing and evaluating approaches for data backup and recovery products
|
Published |
На языке оригинала
|
1966,00
|
|
|
Information security technology—Technical requirements and testing and evaluating approaches of website data recovery products
|
Published |
На языке оригинала
|
2167,00
|
|
|
Information security technology—Functionality and interface specification of cryptographic support platform for trusted computing
|
Published |
На языке оригинала
|
8669,00
|
|
Страницы: 1 / 2 / 3 / 4 / 5 |