Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Signcryption
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for personally identifiable information protection
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Open systems interconnection - Part 1: Object identifier resolution system
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Open systems interconnection - Part 2: Procedures for the object identifier resolution system operational agency
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Sensor networks:Sensor Network Reference Architecture(SNRA) - Part 1: General overview and requirements
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Sensor networks:Sensor Network Reference Architecture(SNRA) - Part 2: Vocabulary and terminology
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Sensor networks:Sensor Network Reference Architecture(SNRA) - Part 3: Reference architecture views
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Sensor networks:Sensor Network Reference Architecture(SNRA) - Part 4: Entity models
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Sensor networks: Sensor Network Reference Architecture(SNRA) - Part 5: Interface definitions
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Privacy capability assessment model
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Requirements for partially anonymous, partially unlinkable authentication
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Lightweight cryptography - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information security - Lightweight cryptography - Part 2: Block ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Lightweight cryptography - Part 3: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - JPEG XR image coding system - Part 2:Image coding specification
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Development of user interface accessibility - Part 1: Code of practice for creating accessible ICT products and services
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Biometric presentation attack detection - Part 1:Framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Biometric presentation attack detection - Part 2: Data formats
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Biometric presentation attack detection - Part 3: Testing and reporting
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - User interfaces - Gesture-based interfaces across devices and methods - Part 1: Framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: ... / 1105 / 1106 / 1107 / 1108 / 1109 / 1110 / 1111 / 1112 / 1113 / 1114 / 1115 / 1116 / 1117 / 1118 ... / 1124 |