| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 22%) в рублях |
|
|
The basic terminology of financial computerization
|
Published |
|
На языке оригинала
|
786,00
|
|
|
|
Technical product documentation--Requirements for computer aided design and drafting--Vocabulary
|
Published |
|
На языке оригинала
|
2440,00
|
|
|
|
Classification and codes of forest pests
|
Published |
|
На языке оригинала
|
6204,00
|
|
|
|
Classification and codes for forestry resources--Natural reserves
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Information technology-Security techniques-Entity authentication-Part 1: General
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Entity authentication-Part 2: Mechanisms using authenticated encryption
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information technology-Security techniques-Entity authentication-Part 3: Mechanisms using digital signature techniques
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Cybersecurity technology-Entity authentication-Part 4: Mechanisms using a cryptographic check function
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero knowledge techniques
|
Published |
|
На языке оригинала
|
2895,00
|
|
|
|
Information technology-Security techniques-Entity authentication-Part 6: Mechanisms using manual data transfer
|
Published |
|
На языке оригинала
|
2440,00
|
|
|
|
Information technology-Security techniques-Digital signature schemes giving message recovery-Part 3Discrete logarithm based mechanisms
|
Published |
|
На языке оригинала
|
3557,00
|
|
|
|
Information technology-Security techniques-Message authentication codes-Part 1: Mechanisms using a block cipher
|
Published |
|
На языке оригинала
|
2895,00
|
|
|
|
Cybersecurity technology-Message authentication codes (MACs)-Part 2: Mechanisms using a dedicated hash-function
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information technology-Security techniques-Message authentication codes (MACs)-Part 3: Mechanisms using a universal hash-function
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information technology-Mag netic stripes on savings books
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Information processing--Text and office systems--Office Document Architecture(ODA) and interchange format--Part 1:Introduction and general principles
|
Published |
|
На языке оригинала
|
2440,00
|
|
|
|
Information processing--Text and office systems--Office Document Architecture(ODA) and interchange format--Part 2:Document structures
|
Published |
|
На языке оригинала
|
7775,00
|
|
|
|
Information technology--Open Document Architecture(ODA) and interchange format--Part 3:Abstract interface for the manipulation of ODA documents
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information processing--Text and office systems--Office Document Architecture (ODA) and interchange format--Part 4:Document profile
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Information processing--Text and office systems--Office Document Architecture (ODA) and interchange format--Part 5:Office Document Interchange Format (ODIF)
|
Published |
|
На языке оригинала
|
6245,00
|
|
| Страницы: ... / 9 / 10 / 11 / 12 / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 ... / 173 |