Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Software engineering - Quality Requirements and Evaluation(SQuaRE) - Quality requirements
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Systems and software engineering - Systems and software Quality Requirements and Evaluation(SQuaRE) - Evaluation process
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Software engineering - Systems and software Quality Requirements and Evaluation(SQuaRE) - Requirements for quality of Ready to Use Software Product(RUSP) and instructions for testing
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information Techonology - Software engineering - Software product Quality Requirements and Evaluation(SQuaRE) - Common Industry Format(CIF) for usability test reports
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Open Document Format for Office Applications(OpenDocument) v1.0
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Systems and software engineering - Requirements for designers and developers of user documentation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Telecommunications and information exchange between systems - MAC-PHY interface for ISO/IEC 26907
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management systems - Requirements
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information security, cybersecurity and privacy protection - Information security controls
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management system implementation guidance
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management - Measurement
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security risk management
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for information security management systems auditing
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for protection of personally identifiable information(PII) in public clouds acting as PII processors
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Competence requirements for information security management system professionals
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 1103 / 1104 / 1105 / 1106 / 1107 / 1108 / 1109 / 1110 / 1111 / 1112 / 1113 / 1114 / 1115 / 1116 ... / 1124 |