Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Personal identification - ISO-compliant driving licence - Part 3: Access control, authentication and integrity validation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Personal identification - ISO-compliant driving licence - Part 5: Mobile driving licence(mDL) application
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping services - Part 1:Framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping service - Part 3: Mechanisms producing linked tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - User Interfaces for mobile tools for management of database communications in a client-server model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics and image processing - Environmental Data Coding Specification(EDCS)
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - IT network security - Part 3:Securing communications between networks using security gateways
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - IT network security - Part 5:Securing communications across networks using virtual private networks
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Random bit generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Prime number generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 2:Asymmetric ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 3: Block Ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information Technology - Icon symbols and functions for controlling multimedia software applications
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Icon symbols and functions for World Wide Web browser toolbars
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental representation - Sensor representation in mixed and augmented reality
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Computer graphics, image processing and environmental data representation - Mixed and augmented reality(MAR) reference model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 1092 / 1093 / 1094 / 1095 / 1096 / 1097 / 1098 / 1099 / 1100 / 1101 / 1102 / 1103 / 1104 / 1105 ... / 1124 |