| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 22%) в рублях |
|
|
Cybersecurity technology-Labeling method for content generated by artificial intelligence
|
Published |
|
На языке оригинала
|
2233,00
|
|
|
|
Data security technology-Technical requirements for information sanitization of electronic products
|
Published |
|
На языке оригинала
|
1199,00
|
|
|
|
Cybersecurity technology-Entity authentication-Part 2: Mechanisms using authenticated encryption
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information technology-Security techniques-Entity authentication-Part 3: Mechanisms using digital signature techniques
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Cybersecurity technology-Entity authentication-Part 4: Mechanisms using a cryptographic check function
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Message authentication codes (MACs)-Part 2: Mechanisms using a dedicated hash-function
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information technology-Security techniques-Digital signatures with appendix-Part 1:General
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Non-repudiation-Part 1: General
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Cybersecurity technology-Non-repudiation-Part 3: Mechanisms using asymmetric techniques
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Information security technology-Modes of operation for a block cipher
|
Published |
|
На языке оригинала
|
2895,00
|
|
|
|
Cybersecurity technology-Hash-functions-Part 1: General
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Hash-functions-Part 2: Hash-functions using a block cipher
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Cybersecurity technology-Hash-functions-Part 3: Dedicated hash-functions
|
Published |
|
На языке оригинала
|
1199,00
|
|
|
|
Cybersecurity technology-Evaluation criteria for IT security-Part 1: Introduction and general model
|
Published |
|
На языке оригинала
|
7403,00
|
|
|
|
Cybersecurity technology-Evaluation criteria for IT security-Part 2: Security functional components
|
Published |
|
На языке оригинала
|
9140,00
|
|
|
|
Cybersecurity technology-Evaluation criteria for IT security-Part 3: Security assurance components
|
Published |
|
На языке оригинала
|
7775,00
|
|
|
|
Cybersecurity technology-Evaluation criteria for IT security-Part 4Framework for specification of evaluation methods and activities
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Cybersecurity technology-Evaluation criteria for IT security-Part 5Pre-defined packages of security requirements
|
Published |
|
На языке оригинала
|
2440,00
|
|
|
|
Cybersecurity technology-Public key infrastructure-Online certificate status protocol
|
Published |
|
На языке оригинала
|
2895,00
|
|
| Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 ... / 9 |