| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information technology - User interface icons - Part 40:Management of icon registration
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Overview, models and notation
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element(SESE) service definition
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element(SESE) protocol specification
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Protecting transfer syntax specification
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open systems interconnection - Application context for systems management with transaction processing
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - General characteristics
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 1:Physical characteristics
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 2:Dimensions and location of the accessible optical area
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 3: Optical properties and characteristics
|
|
|
На языке оригинала
|
1555,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 4: Logical data structures
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Programming languages - M
|
|
|
На языке оригинала
|
14256,00
|
|
|
|
Information technology - Security techniques - Key management - Part 1: Framework
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
|
|
|
На языке оригинала
|
14256,00
|
|
|
|
Information technology - Security techniques - Key management - Part 4:Mechanisms based on weak secrets
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Key management - Part 5: Group key management
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Computer graphics and image processing - Image Processing and Interchange(IPI) - Functional specification - Part 5:Basic Image Interchange Format(BIIF)
|
|
|
На языке оригинала
|
29808,00
|
|
|
|
Information technology - Computer graphics and image processing - Encoding for the Image Interchange Facility(IIF)
|
|
|
На языке оригинала
|
1555,00
|
|
| Страницы: ... / 1081 / 1082 / 1083 / 1084 / 1085 / 1086 / 1087 / 1088 / 1089 / 1090 / 1091 / 1092 / 1093 / 1094 ... / 1127 |