Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Data security technology—Audit and management guide for personal information processing normativeness of mobile internet applications in App stores
|
Published |
На языке оригинала
|
2477,00
|
|
|
Cybersecurity technology—Requirements for crowdsourcing security test services
|
Published |
На языке оригинала
|
1786,00
|
|
|
Cybersecurity technology—Technical specification for caller identity authentication using crypto tokens
|
Published |
На языке оригинала
|
2822,00
|
|
|
IPv6 address assignment and coding rules—Interface identifier
|
Published |
На языке оригинала
|
1786,00
|
|
|
Cybersecurity technology—Evaluation method for open source code security of software products
|
Published |
На языке оригинала
|
2189,00
|
|
|
Industrial internet enterprise cybersecurity—Part 1: Protection requirements of internet industrial enterprise
|
Published |
На языке оригинала
|
2822,00
|
|
|
Industrial internet enterprise cybersecurity—Part 2:Protection requirements of industrial internet platform enterprise
|
Published |
На языке оригинала
|
3744,00
|
|
|
Industrial internet enterprise cybersecurity—Part 3:Protection requirements of industrial internet identification resolution enterprise
|
Published |
На языке оригинала
|
2822,00
|
|
|
Data security technology—Personal information processing rules of internet platforms, products and services
|
Published |
На языке оригинала
|
1786,00
|
|
|
Cybersecurity technology—Cybersecurity technical specification for smart lock products
|
Published |
На языке оригинала
|
4666,00
|
|
|
Cybersecurity technology—Cyber-resilience evaluation criteria
|
Published |
На языке оригинала
|
3398,00
|
|
|
Cybersecurity technology—Cybersecurity product interconnectivity—Part 1:Framework
|
Published |
На языке оригинала
|
2477,00
|
|
|
Data security technology—General framework for the confidential computing
|
Published |
На языке оригинала
|
3744,00
|
|
|
Data security technology—Capacity requirements for assessment organization of data security
|
Published |
На языке оригинала
|
2189,00
|
|
|
Data security technology—Security requirements for automated decision making based on personal information
|
Published |
На языке оригинала
|
2189,00
|
|
|
Data security technology—Security requirements for government data processing
|
Published |
На языке оригинала
|
3110,00
|
|
|
Data security technology—Requirements for large Internet companies internal personal information protection supervision agency
|
Published |
На языке оригинала
|
2189,00
|
|
|
Security technical requirements for critical network devices—Programmable logic controller(PLC)
|
Published |
На языке оригинала
|
1670,00
|
|
|
Data security technology—Security requirements for processing of sensitive personal information
|
Published |
На языке оригинала
|
2189,00
|
|
|
Cybersecurity technology—Guidelines for application of cybersecurity insurance
|
Published |
На языке оригинала
|
2822,00
|
|
Страницы: 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 |