| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information technology-Security techniques—Anonymous entity authentication-Part 2: Mechanisms based on signatures using a group public key
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Information technology—Security techniques—Anonymous entity authentication—Part 4: Mechanisms based on weak secrets
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Information security technology—Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Information security technology—Security technical requirements and testing and evaluation approachs for operating system of smart mobile terminals
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information security technology—Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Information security technology—Technology requirements for personal information protection of smart mobile terminal
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Information security technology—Technical requirements and testing evaluation approaches of information system security management platform products
|
Published |
|
На языке оригинала
|
4104,00
|
|
|
|
Technology requirement of mobile terminal browser software
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—Smart card reader security technology requirements(EAL4+)
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Smart home for internet of things—Unicode of data and device
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Personal information security specification
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Information security technology—SM2 cryptographic algorithm encrypted signature message syntax specification
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology—SM2 cryptographic algorithm usage specification
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Information security technology—Security technical requirements and testing and evaluation approaches for antivirus gateway products
|
Published |
|
На языке оригинала
|
3024,00
|
|
|
|
Information security technology—Technical requirements for mobile terminal security protection
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Security reference architecture of cloud computing
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—Requirement and code of conduct for security testing bodies of information technology products
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology - Security technique requirements for application servers in mobile Internet
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Information security technology - Requirements and assessment methods for website identity and system security
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—Public key infrastructure—Technical requirements for digital certificate based reliable electronic signature creation and verification
|
Published |
|
На языке оригинала
|
1339,00
|
|
| Страницы: ... / 20 / 21 / 22 / 23 / 24 / 25 / 26 / 27 / 28 / 29 / 30 / 31 / 32 / 33 ... / 40 |