| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Data center—Resource utilization—Part 2:Setting requirement for key performance indicators
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Data center—Resource utilization—Part 3: Electric energy usage effectiveness requirements and measuring methods
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Data center—Resource utilization—Part 4: Renewable energy factor
|
Published |
|
На языке оригинала
|
1469,00
|
|
|
|
Specification for software testing cost measurement
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information technology—Specification of word form of traditional Mongolian words—Basic set
|
Published |
|
На языке оригинала
|
18014,00
|
|
|
|
Information technology—Meta Object Facility (MOF)
|
Published |
|
На языке оригинала
|
7430,00
|
|
|
|
Information security technology —Capability requirements of cybersecurity service
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Information security technology—Randomness test methods for binary sequence
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information security techniques—Guidelines for the assessment of information security controls
|
Published |
|
На языке оригинала
|
4882,00
|
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 1: General
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 2: Digital signature algorithm
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 3: Key exchange protocol
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 4: Public key encryption algorithm
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 5: Parameter definition
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology—Application guide to industrial control system security control
|
Published |
|
На языке оригинала
|
6048,00
|
|
|
|
Information security technology—Information security management for inter-sector and inter-organizational communications
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Security criterion on supplier conduct of information technology products
|
Published |
|
На языке оригинала
|
1037,00
|
|
|
|
Information security technology—Baseline and implementation guide of IPSec VPN securing access
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information technology—Security techniques—Governance of information security
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology—Guideline for cyber security warning
|
Published |
|
На языке оригинала
|
1253,00
|
|
| Страницы: ... / 80 / 81 / 82 / 83 / 84 / 85 / 86 / 87 / 88 / 89 / 90 / 91 / 92 / 93 ... / 166 |