Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Data center—Resource utilization—Part 2:Setting requirement for key performance indicators
|
Published |
На языке оригинала
|
1670,00
|
|
|
Data center—Resource utilization—Part 3: Electric energy usage effectiveness requirements and measuring methods
|
Published |
На языке оригинала
|
1786,00
|
|
|
Data center—Resource utilization—Part 4: Renewable energy factor
|
Published |
На языке оригинала
|
1958,00
|
|
|
Specification for software testing cost measurement
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information technology—Specification of word form of traditional Mongolian words—Basic set
|
Published |
На языке оригинала
|
24019,00
|
|
|
Information technology—Meta Object Facility (MOF)
|
Published |
На языке оригинала
|
9907,00
|
|
|
Information security technology —Capability requirements of cybersecurity service
|
Published |
На языке оригинала
|
2189,00
|
|
|
Information security technology—Randomness test methods for binary sequence
|
Published |
На языке оригинала
|
2822,00
|
|
|
Information security techniques—Guidelines for the assessment of information security controls
|
Published |
На языке оригинала
|
6509,00
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 1: General
|
Published |
На языке оригинала
|
4378,00
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 2: Digital signature algorithm
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 3: Key exchange protocol
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 4: Public key encryption algorithm
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 5: Parameter definition
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Application guide to industrial control system security control
|
Published |
На языке оригинала
|
8064,00
|
|
|
Information security technology—Information security management for inter-sector and inter-organizational communications
|
Published |
На языке оригинала
|
3110,00
|
|
|
Information security technology—Security criterion on supplier conduct of information technology products
|
Published |
На языке оригинала
|
1382,00
|
|
|
Information security technology—Baseline and implementation guide of IPSec VPN securing access
|
Published |
На языке оригинала
|
2477,00
|
|
|
Information technology—Security techniques—Governance of information security
|
Published |
На языке оригинала
|
1786,00
|
|
|
Information security technology—Guideline for cyber security warning
|
Published |
На языке оригинала
|
1670,00
|
|
Страницы: ... / 80 / 81 / 82 / 83 / 84 / 85 / 86 / 87 / 88 / 89 / 90 / 91 / 92 / 93 ... / 166 |