Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information security technology—Specifications of cryptograph and related security technology for certificate authentication system
|
Published |
На языке оригинала
|
3744,00
|
|
|
Information security technology—Implementation guide for classified protection of cybersecurity
|
Published |
На языке оригинала
|
4378,00
|
|
|
Information security technology—XML digital signature syntax and processing specification
|
Published |
На языке оригинала
|
4723,00
|
|
|
Information security technology - Authentication and authorization - Role-based access control model and management specification
|
Published |
На языке оригинала
|
3398,00
|
|
|
Information security technology - Public key infrastructure - Electronic signature formats specification
|
Published |
На языке оригинала
|
4032,00
|
|
|
Information security technology - Public key infrastructure - Security requirements for signature creation applications
|
Published |
На языке оригинала
|
4032,00
|
|
|
Information security technology—Type and code of information security products
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems
|
Published |
На языке оригинала
|
4032,00
|
|
|
Information technology—Security techniques—Network security—Part 1:Overview and concepts
|
Published |
На языке оригинала
|
4378,00
|
|
|
Information technology—Security techniques—Network security—Part 2: Guidelines for the design and implementation of network security
|
Published |
На языке оригинала
|
2650,00
|
|
|
Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
|
Published |
На языке оригинала
|
3744,00
|
|
|
Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information technology—Security techniques—Network security—Part 5: Securing communications across networks using virtual private networks
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information security techniques—Terminology
|
Published |
На языке оригинала
|
9331,00
|
|
|
Information security technology — Technical requirements of security design for classified protection of cybersecurity
|
Published |
На языке оригинала
|
4666,00
|
|
|
Classification and codes for products of gems and precious metals
|
Published |
На языке оригинала
|
2189,00
|
|
|
Supply chain management business reference model
|
Published |
На языке оригинала
|
2189,00
|
|
|
Function Specification for three-dimensional CAD Software
|
Published |
На языке оригинала
|
1786,00
|
|
|
Enterprise resource planning - Part 1пјљERP terms
|
Published |
На языке оригинала
|
4378,00
|
|
|
Enterprise resource planning-Part 2 пјљERP foundational data
|
Published |
На языке оригинала
|
3744,00
|
|
Страницы: ... / 45 / 46 / 47 / 48 / 49 / 50 / 51 / 52 / 53 / 54 / 55 / 56 / 57 / 58 ... / 166 |