| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 22%) в рублях |
|
|
Information security techniques-Guidelines for the assessment of information security controls
|
Published |
|
На языке оригинала
|
4673,00
|
|
|
|
Information security technology-Information security management for inter-sector and inter-organizational communications
|
Published |
|
На языке оригинала
|
2233,00
|
|
|
|
Information security technology-Baseline and implementation guide of IPSec VPN securing access
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information security technology-ZUC stream cipher algorithm-Part 2: Confidentiality algorithm
|
Published |
|
На языке оригинала
|
1199,00
|
|
|
|
Information security technology-ZUC stream cipher algorithm-Part 3: Integrity algorithm
|
Published |
|
На языке оригинала
|
1199,00
|
|
|
|
Information security technology-Security requirement of public domain name service system
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Cybersecurity technology-Security technology requirements for wireless local area network client
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Cybersecurity technology-Security technology requirements for wireless local area network access system
|
Published |
|
На языке оригинала
|
3350,00
|
|
|
|
Cybersecurity technology-The assessment method for security capability of cloud computing service
|
Published |
|
На языке оригинала
|
7899,00
|
|
|
|
Data security technology-Security capability requirements for big data services
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information security technology-Security technology specifications of mobile e-government system
|
Published |
|
На языке оригинала
|
2233,00
|
|
|
|
Information security technology-Security technical specification for radio frequency identification RFIDsystems
|
Published |
|
На языке оригинала
|
3143,00
|
|
|
|
Cybersecurity technology-Criteria for determing network attack and network attack incident
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Data security technology-Security requirements for data transaction service
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information security technology-Cybersecurity requirements for critical information infrastructure protection
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Information security technology-General requirements for security of Internet information services
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information security technology-Trusted computing specification-Trusted platform control module
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Information security technique-Entity authentication assurance framework
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information security technology-Guide to malware incident prevention and handling
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Information security technology-Technical requirements for security processor
|
Published |
|
На языке оригинала
|
3805,00
|
|
| Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 |