| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 22%) в рублях |
|
|
Systems and software engineering-Systems and software Quality Requirements and Evaluation (SQuaRE)-Part 41: Evaluation guide for developers, acquirers and independent evaluators
|
Published |
|
На языке оригинала
|
3350,00
|
|
|
|
Systems and software engineering-Systems and software Quality Requirements and Evaluation (SQuaRE)-Part 45: Evaluation module for recoverability
|
Published |
|
На языке оригинала
|
2688,00
|
|
|
|
Systems and software engineering-Systems and software Quality Requirements and Evaluation (SQuaRE)-Part 51Requirements for quality of Ready to Use Software Product (RUSP) and instructions for testing
|
Published |
|
На языке оригинала
|
2233,00
|
|
|
|
Software engineering-Software product quality requirements and evaluation (SQuaRE)-Common industry format (CIF) for usability test reports
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Ships and marine technology - Data transfer standard for maritime and intermodal transportation and security
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information security technology-Specifications of cryptograph and related security technology for certificate authentication system
|
Published |
|
На языке оригинала
|
2688,00
|
|
|
|
Information security technology-Implementation guide for classified protection of cybersecurity
|
Published |
|
На языке оригинала
|
3143,00
|
|
|
|
Information security technology-XML digital signature syntax and processing specification
|
Published |
|
На языке оригинала
|
3391,00
|
|
|
|
Information security technology - Authentication and authorization - Role-based access control model and management specification
|
Published |
|
На языке оригинала
|
2440,00
|
|
|
|
Information security technology - Public key infrastructure - Electronic signature formats specification
|
Published |
|
На языке оригинала
|
2895,00
|
|
|
|
Information security technology - Public key infrastructure - Security requirements for signature creation applications
|
Published |
|
На языке оригинала
|
2895,00
|
|
|
|
Information security technology-Type and code of information security products
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information technology-Security techniques-Requirements for bodies providing audit and certification of information security management systems
|
Published |
|
На языке оригинала
|
2895,00
|
|
|
|
Information technology-Security techniques-Network security-Part 1:Overview and concepts
|
Published |
|
На языке оригинала
|
3143,00
|
|
|
|
Information technology-Security techniques-Network security-Part 2: Guidelines for the design and implementation of network security
|
Published |
|
На языке оригинала
|
1902,00
|
|
|
|
Information technology-Security techniques-Network security-Part 3: Threats, design techniques and control for network access scenarios
|
Published |
|
На языке оригинала
|
2688,00
|
|
|
|
Information technology-Security techniques-Network security-Part 4: Securing communications between networks using security gateways
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information technology-Security techniques-Network security-Part 5: Securing communications across networks using virtual private networks
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information technology-Security techniques-Network security-Part 6: Securing wireless IP network access
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information security techniques-Terminology
|
Published |
|
На языке оригинала
|
6700,00
|
|
| Страницы: ... / 45 / 46 / 47 / 48 / 49 / 50 / 51 / 52 / 53 / 54 / 55 / 56 / 57 / 58 ... / 173 |