Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for cybersecurity
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 3:Reference networking scenarios - Threats, design techniques and control issues
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security incident management
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security techniques - Extension to KS X ISO/IEC 27001 and KS X ISO/IEC 27002 for privacy information management - Requirements and guidelines
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Office equipment - Determination of chemical emission rates from electronic equipment - Part 1: Using-consumables
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Office equipment - Determination of chemical emission rates from electronic equipment - Part 2: Not using-consumables
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Telecommunications and information exchange between systems - Near Field Communication Wired Interface (NFC-WI)
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Privacy framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 - Part 9:Vascular image data
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Entity authentication assurance framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Verification of cryptographic protocols
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for privacy impact assessment
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - User interfaces - Accessibility of personal computer hardware
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - User interface accessibility - Part 1: User accessibility needs
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology for learning, education and training - Nomadicity and mobile technologies
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 1104 / 1105 / 1106 / 1107 / 1108 / 1109 / 1110 / 1111 / 1112 / 1113 / 1114 / 1115 / 1116 / 1117 ... / 1124 |