Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping service - Part 3: Mechanisms producing linked tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - User Interfaces for mobile tools for management of database communications in a client-server model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics and image processing - Environmental Data Coding Specification(EDCS)
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - IT network security - Part 3:Securing communications between networks using security gateways
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - IT network security - Part 5:Securing communications across networks using virtual private networks
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Random bit generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Prime number generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 2:Asymmetric ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 3: Block Ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information Technology - Icon symbols and functions for controlling multimedia software applications
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Icon symbols and functions for World Wide Web browser toolbars
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental representation - Sensor representation in mixed and augmented reality
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - Mixed and augmented reality(MAR) reference model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - Live actor and entity representation in mixed and augmented reality(MAR)
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - EDCS language bindings - Part 4:C
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Spatial Reference Model(SRM) language bindings - Part 4:C
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 1082 / 1083 / 1084 / 1085 / 1086 / 1087 / 1088 / 1089 / 1090 / 1091 / 1092 / 1093 / 1094 / 1095 ... / 1114 |