| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion detection system
|
Published |
|
На языке оригинала
|
4104,00
|
|
|
|
Information security technology—Security technical requirements and testing assessment approaches for network vulnerability scanners
|
Published |
|
На языке оригинала
|
4190,00
|
|
|
|
Cybersecurity technology—Technical specification for network and terminal separation products
|
Published |
|
На языке оригинала
|
3499,00
|
|
|
|
Information security technology—Technical specification for network security audit products
|
Published |
|
На языке оригинала
|
3499,00
|
|
|
|
Information security technology—Risk assessment method for information security
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Guidelines for category and classification of cybersecurity incidents
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information security techniques—Public key infrastructure—Security technology requirement for PKI system
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security techniques—Public key infrastructure—Security testing assessment approaches for PKI system
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Cybersecurity technology—Information security controls
|
Published |
|
На языке оригинала
|
8122,00
|
|
|
|
Information security technology—Implementation guide for information security risk management
|
Published |
|
На языке оригинала
|
3974,00
|
|
|
|
Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Information technology—Security techniques—Network security—Part 4: Securing communications between networks using security gateways
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security techniques—Terminology
|
Published |
|
На языке оригинала
|
6998,00
|
|
|
|
Information security technology—Technical specification for network intrusion prevention system
|
Published |
|
На языке оригинала
|
3024,00
|
|
|
|
Cybersecurity technology—General security technical specification for terminal computer
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Cybersecurity technology—Security specifications for office devices
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—Information security management systems—Overview and vocabulary
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Technical requirements and testing and evaluating approaches for data backup and recovery products
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Technical requirements and testing and evaluating approaches of website data recovery products
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Information security technology—Functionality and interface specification of cryptographic support platform for trusted computing
|
Published |
|
На языке оригинала
|
8208,00
|
|
| Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 |