| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Data security technology—Audit and management guide for personal information processing normativeness of mobile internet applications in App stores
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Cybersecurity technology—Requirements for crowdsourcing security test services
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Cybersecurity technology—Technical specification for caller identity authentication using crypto tokens
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
IPv6 address assignment and coding rules—Interface identifier
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Cybersecurity technology—Evaluation method for open source code security of software products
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Industrial internet enterprise cybersecurity—Part 1: Protection requirements of internet industrial enterprise
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Industrial internet enterprise cybersecurity—Part 2:Protection requirements of industrial internet platform enterprise
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Industrial internet enterprise cybersecurity—Part 3:Protection requirements of industrial internet identification resolution enterprise
|
Published |
|
На языке оригинала
|
2117,00
|
|
|
|
Data security technology—Personal information processing rules of internet platforms, products and services
|
Published |
|
На языке оригинала
|
1339,00
|
|
|
|
Cybersecurity technology—Cybersecurity technical specification for smart lock products
|
Published |
|
На языке оригинала
|
3499,00
|
|
|
|
Cybersecurity technology—Cyber-resilience evaluation criteria
|
Published |
|
На языке оригинала
|
2549,00
|
|
|
|
Cybersecurity technology—Cybersecurity product interconnectivity—Part 1:Framework
|
Published |
|
На языке оригинала
|
1858,00
|
|
|
|
Data security technology—General framework for the confidential computing
|
Published |
|
На языке оригинала
|
2808,00
|
|
|
|
Data security technology—Capacity requirements for assessment organization of data security
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Data security technology—Security requirements for automated decision making based on personal information
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Data security technology—Security requirements for government data processing
|
Published |
|
На языке оригинала
|
2333,00
|
|
|
|
Data security technology—Requirements for large Internet companies internal personal information protection supervision agency
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Security technical requirements for critical network devices—Programmable logic controller(PLC)
|
Published |
|
На языке оригинала
|
1253,00
|
|
|
|
Data security technology—Security requirements for processing of sensitive personal information
|
Published |
|
На языке оригинала
|
1642,00
|
|
|
|
Cybersecurity technology—Guidelines for application of cybersecurity insurance
|
Published |
|
На языке оригинала
|
2117,00
|
|
| Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 |