| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Cybersecurity technology—Methodology for IT security evaluation
|
Published |
|
На языке оригинала
|
11232,00
|
|
|
|
Information security technology—Public key infrastructure—Testing and assessment of compliance with standards
|
Published |
|
На языке оригинала
|
3283,00
|
|
|
|
Cybersecurity technology—Government client computer core configuration specifications
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Information security technology—Technical specification for anti-spam products
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Information security service—Classification and code
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Security guidance for cloud computing services
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Security capability requirements for cloud computing services
|
Published |
|
На языке оригинала
|
4320,00
|
|
|
|
Information technology—Security techniques—Information security management systems—Guidance
|
Published |
|
На языке оригинала
|
3024,00
|
|
|
|
Cybersecurity technology—Information security management—Monitoring,measurement,analysis and evaluation
|
Published |
|
На языке оригинала
|
3715,00
|
|
|
|
Cybersecurity technology—Security specification of data recovery service for storage media
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information security technology—Security guidelines for website system of government affairs
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Information security technology —Capability requirements of cybersecurity service
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Information security techniques—Guidelines for the assessment of information security controls
|
Published |
|
На языке оригинала
|
4882,00
|
|
|
|
Information security technology—Information security management for inter-sector and inter-organizational communications
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Information security technology—Baseline and implementation guide of IPSec VPN securing access
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Information security technology—ZUC stream cipher algorithm—Part 2: Confidentiality algorithm
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Information security technology—ZUC stream cipher algorithm—Part 3: Integrity algorithm
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Information security technology—Security requirement of public domain name service system
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Cybersecurity technology—Security technology requirements for wireless local area network client
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Cybersecurity technology—Security technology requirements for wireless local area network access system
|
Published |
|
На языке оригинала
|
3499,00
|
|
| Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 |