| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 22%) в рублях |
|
|
Information technology - Telecommunications and information exchange between systems - MAC-PHY interface for ISO/IEC 26907
|
|
|
На языке оригинала
|
6222,00
|
|
|
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Information security management systems - Requirements
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information security, cybersecurity and privacy protection - Information security controls
|
|
|
На языке оригинала
|
28621,00
|
|
|
|
Information technology - Security techniques - Information security management system implementation guidance
|
|
|
На языке оригинала
|
8711,00
|
|
|
|
Information technology - Security techniques - Information security management - Measurement
|
|
|
На языке оригинала
|
6222,00
|
|
|
|
Information technology - Security techniques - Information security risk management
|
|
|
На языке оригинала
|
8711,00
|
|
|
|
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Guidelines for information security management systems auditing
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations
|
|
|
На языке оригинала
|
6222,00
|
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
|
|
На языке оригинала
|
6222,00
|
|
|
|
Information technology - Security techniques - Code of practice for protection of personally identifiable information(PII) in public clouds acting as PII processors
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Competence requirements for information security management system professionals
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Guidelines for cybersecurity
|
|
|
На языке оригинала
|
8711,00
|
|
|
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts
|
|
|
На языке оригинала
|
8711,00
|
|
|
|
Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Network security - Part 3:Reference networking scenarios - Threats, design techniques and control issues
|
|
|
На языке оригинала
|
4355,00
|
|
|
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts
|
|
|
На языке оригинала
|
8711,00
|
|
| Страницы: ... / 1106 / 1107 / 1108 / 1109 / 1110 / 1111 / 1112 / 1113 / 1114 / 1115 / 1116 / 1117 / 1118 / 1119 ... / 1127 |