| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 22%) в рублях |
|
|
Information security techniques-Assessment criteria for cybersecurity emergency capability
|
Published |
|
На языке оригинала
|
3557,00
|
|
|
|
Information security technology-Security requirements for software development kit (SDK) in mobile internet applications (App)
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Information security technology-Basic security requirements for pre-installed applications on smart mobile terminals
|
Published |
|
На языке оригинала
|
1199,00
|
|
|
|
Information security technologyGuidelines for cyber security information submission
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Information security technology-Electronic discovery-Part 1: Overview and concepts
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Information security technology-Universal cryptography service interface specification
|
Published |
|
На языке оригинала
|
4880,00
|
|
|
|
Cybersecurity technology-Certificate application integrated service interface specification
|
Published |
|
На языке оригинала
|
4922,00
|
|
|
|
Cybersecurity technology-Zero trust reference architecture
|
Published |
|
На языке оригинала
|
1199,00
|
|
|
|
Data security technology - Rules for data classification and grading
|
Published |
|
На языке оригинала
|
2233,00
|
|
|
|
Cybersecurity technology-Security requirements for software supply chain
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Data security technology-Audit and management guide for personal information processing normativeness of mobile internet applications in App stores
|
Published |
|
На языке оригинала
|
1778,00
|
|
|
|
Cybersecurity technology-Requirements for crowdsourcing security test services
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Technical specification for caller identity authentication using crypto tokens
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
IPv6 address assignment and coding rules-Interface identifier
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Evaluation method for open source code security of software products
|
Published |
|
На языке оригинала
|
1572,00
|
|
|
|
Industrial internet enterprise cybersecurity-Part 1: Protection requirements of internet industrial enterprise
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Industrial internet enterprise cybersecurity-Part 2Protection requirements of industrial internet platform enterprise
|
Published |
|
На языке оригинала
|
2688,00
|
|
|
|
Industrial internet enterprise cybersecurity-Part 3Protection requirements of industrial internet identification resolution enterprise
|
Published |
|
На языке оригинала
|
2027,00
|
|
|
|
Data security technology-Personal information processing rules of internet platforms, products and services
|
Published |
|
На языке оригинала
|
1282,00
|
|
|
|
Cybersecurity technology-Cybersecurity technical specification for smart lock products
|
Published |
|
На языке оригинала
|
3350,00
|
|
| Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 |