| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information security technology—Specifications of cryptograph and related security technology for certificate authentication system
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Information security technology—Implementation guide for classified protection of cybersecurity
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Information security technology—XML digital signature syntax and processing specification
|
Published |
|
На языке оригинала
|
3542,00
|
|
|
|
Information security technology - Authentication and authorization - Role-based access control model and management specification
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Information security technology - Public key infrastructure - Electronic signature formats specification
|
Published |
|
На языке оригинала
|
3024,00
|
|
|
|
Information security technology - Public key infrastructure - Security requirements for signature creation applications
|
Published |
|
На языке оригинала
|
3024,00
|
|
|
|
Information security technology—Type and code of information security products
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems
|
Published |
|
На языке оригинала
|
3024,00
|
|
|
|
Information technology—Security techniques—Network security—Part 1:Overview and concepts
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Information technology—Security techniques—Network security—Part 2: Guidelines for the design and implementation of network security
|
Published |
|
На языке оригинала
|
1987,00
|
|
|
|
Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information technology—Security techniques—Network security—Part 5: Securing communications across networks using virtual private networks
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security techniques—Terminology
|
Published |
|
На языке оригинала
|
6998,00
|
|
|
|
Information security technology — Technical requirements of security design for classified protection of cybersecurity
|
Published |
|
На языке оригинала
|
3499,00
|
|
|
|
Classification and codes for products of gems and precious metals
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Supply chain management business reference model
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Function Specification for three-dimensional CAD Software
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Enterprise resource planning - Part 1пјљERP terms
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Enterprise resource planning-Part 2 пјљERP foundational data
|
Published |
|
На языке оригинала
|
2808,00
|
|
| Страницы: ... / 45 / 46 / 47 / 48 / 49 / 50 / 51 / 52 / 53 / 54 / 55 / 56 / 57 / 58 ... / 166 |