Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology—Cloud computing—File service application interface
|
Published |
На языке оригинала
|
4954,00
|
|
|
Information technology—Security techniques—Authenticated encryption
|
Published |
На языке оригинала
|
2822,00
|
|
|
Smart city—Data fusion—Part 3: Data acquisition specifications
|
Published |
На языке оригинала
|
1670,00
|
|
|
Smart city—Data fusion—Part 4: Opening and sharing requirements
|
Published |
На языке оригинала
|
1670,00
|
|
|
Smart city—Data fusion—Part 5:Data elements of basic municipal facilities
|
Published |
На языке оригинала
|
3744,00
|
|
|
Information security technology—Management guide for secure operation and maintenance of information systems
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information security technology—Testing and evaluation technical guide for classified cybersecurity protection
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information technology—Telecommunications and information exchange between systems—Visible light communication—Part 1:General requirements of media access control and physical layer
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information technologyпјЌTelecommunications and information exchange between systemsпјЌVisible light communicationпјЌPart 2пјљSpecification of media access control and physical layer for low-rate and narrowband visible light communication
|
Published |
На языке оригинала
|
7258,00
|
|
|
Information technologyпјЌTelecommunications and information exchange between systemsпјЌVisible light communicationпјЌPart 3пјљSpecification of media access control and physical layer for high-rate visible light communication
|
Published |
На языке оригинала
|
7027,00
|
|
|
Information technologyпјЌTelecommunications and information exchange between systemsпјЌVisible light communicationпјЌPart 4пјљTransmission protocol for indoor positioning
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 1: Security technique requirements for reader
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrier
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 3: Verification service message and processing rules
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security technology—Controllability evaluation index for security of information technology products—Part 1:General principles
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Controllability evaluation index for security of information technology products—Part 2: Central processing unit
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Controllability evaluation index for security of information technology products—Part 3: Operating system
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Controllability evaluation index for security of information technology products—Part 4: Office suite
|
Published |
На языке оригинала
|
1670,00
|
|
|
Information security technology—Controllability evaluation index for security of information technology products—Part 5: General purpose computer
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Time stamp policy and time stamp practice rules
|
Published |
На языке оригинала
|
1670,00
|
|
Страницы: ... / 105 / 106 / 107 / 108 / 109 / 110 / 111 / 112 / 113 / 114 / 115 / 116 / 117 / 118 ... / 166 |