| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information technology - Tibetan ideogram coded character set (extension set B) - 16Г—32 dot matrix font - Bkav bstan bold
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Information technology - Tibetan ideogram coded character set (extension set B) - 24Г—48 dot matrix font - Bkav bstan lean
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Information technology - Tibetan ideogram coded character set (extension set B) - 24Г—48 dot matrix font - Bkav bstan bold
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Information security techniques - Public key infrastructure - Bridge Certification Authority leveled certificate specification
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology - Trusted computing specification - Trusted connect architecture
|
Published |
|
На языке оригинала
|
6696,00
|
|
|
|
Classification and code of energy sources
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Information technology—JPEG 2000 image coding system—Part 1: Core Coding system
|
Published |
|
На языке оригинала
|
8899,00
|
|
|
|
Information technology—Biometric application programming interface—Part 1: BioAPI specification
|
Published |
|
На языке оригинала
|
9677,00
|
|
|
|
Information technology—Conformance testing for the biometric application programming interface (BioAPI)—Part 1: Methods and procedures
|
Published |
|
На языке оригинала
|
9547,00
|
|
|
|
Information technology—Conformance testing for biometric application programming interface(BioAPI)—Part 2: Test assertions for biometric service providers
|
Published |
|
На языке оригинала
|
11232,00
|
|
|
|
Information technology—Sensor network—Part 601: Information security general technical specifications
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Information security technology—Assessment criteria for information security service capability
|
Published |
|
На языке оригинала
|
3715,00
|
|
|
|
Information security technology—Common methodology for information systems security assurance evaluation
|
Published |
|
На языке оригинала
|
7862,00
|
|
|
|
Information security technology—Authentication and authorization—Authentication middleware framework and interface specification
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information security technology—Specification for cybersecurity vulnerability management
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Information security technology—Guidelines for categorization and classification of cybersecurity vulnerability
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—Authentication and authorization—Geospatial eXtensible Access Control Markup Language (GeoXACML)
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—Authentication and authorization—eXtensible Access Control Markup Language (XACML)
|
Published |
|
На языке оригинала
|
6307,00
|
|
|
|
Information security techniquesпјЌSecurity technical requirements for operating system on smart mobile terminal
|
Published |
|
На языке оригинала
|
3499,00
|
|
|
|
Information security technology—Construction and sustain management specifications of disaster recovery center
|
Published |
|
На языке оригинала
|
2117,00
|
|
| Страницы: ... / 13 / 14 / 15 / 16 / 17 / 18 / 19 / 20 / 21 / 22 / 23 / 24 / 25 / 26 ... / 40 |