| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information technology - Open systems interconnection - Conformance testing methodology and framework - Part 2:Abstract test suite specification
|
|
|
На языке оригинала
|
6480,00
|
|
|
|
Information technology - Open Systems Interconnection - Conformance testing methodology and framework - Part 4:Test realization
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Conformance testing methodology and framework - Part 6:Protocol profile test specification
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Guidelines for the organization and representation of data elements for data interchange - Coding methods and principles
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 2:Integer factorization based mechanisms
|
|
|
На языке оригинала
|
6480,00
|
|
|
|
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3:Discrete logarithm based mechanisms
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Security techniques - Message authentication codes (MACs) - Part 1: Mechanisms using a block cipher
|
|
|
На языке оригинала
|
6480,00
|
|
|
|
Information security - Message authentication codes(MACs) - Part 2: Mechanisms using a dedicated hash-function
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 3: Mechanisms using a universal hash-function
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Entity authentication - Part 1:General
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Entity authentication - Part 3:Mechanisms using digital signature techniques
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Security techniques - Entity authentication - Part 5:Mechanisms using zero-knowledge techniques
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Security techniques - Entity authentication - Part 6: Mechanisms using manual data transfer
|
|
|
На языке оригинала
|
6480,00
|
|
|
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities - Part 2: Registration procedures for OSI document types
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities:Registration of Object Identifier arcs beneath the top-level arc jointly administered by ISO and ITU-T
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities - Part 4: Register of VTE Profiles
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open systems interconnection - Procedures for the operation of OSI registration authorities - Part 5:Register of VT control object definitions
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities - Part 9: Registration of object identifier arcs for applications and services using tag-based identification
|
|
|
На языке оригинала
|
2592,00
|
|
| Страницы: ... / 46 / 47 / 48 / 49 / 50 / 51 / 52 / 53 / 54 / 55 / 56 / 57 / 58 / 59 ... / 95 |