| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Overview, models and notation
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element(SESE) service definition
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element(SESE) protocol specification
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Open Systems Interconnection - Generic upper layers security: Protecting transfer syntax specification
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Information technology - Open systems interconnection - Application context for systems management with transaction processing
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - General characteristics
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 1:Physical characteristics
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 2:Dimensions and location of the accessible optical area
|
|
|
На языке оригинала
|
2592,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 3: Optical properties and characteristics
|
|
|
На языке оригинала
|
1555,00
|
|
|
|
Identification cards - Optical memory cards - Linear recording method - Part 4: Logical data structures
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Programming languages - M
|
|
|
На языке оригинала
|
14256,00
|
|
|
|
Information technology - Security techniques - Key management - Part 1: Framework
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
IT Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
|
|
|
На языке оригинала
|
14256,00
|
|
|
|
Information technology - Security techniques - Key management - Part 4:Mechanisms based on weak secrets
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
Information technology - Security techniques - Key management - Part 5: Group key management
|
|
|
На языке оригинала
|
4536,00
|
|
|
|
|
|
|
На языке оригинала
|
9072,00
|
|
|
|
Information technology - Computer graphics and image processing - Image Processing and Interchange(IPI) - Functional specification - Part 5:Basic Image Interchange Format(BIIF)
|
|
|
На языке оригинала
|
29808,00
|
|
|
|
Information technology - Computer graphics and image processing - Encoding for the Image Interchange Facility(IIF)
|
|
|
На языке оригинала
|
1555,00
|
|
|
|
Information technology - Telecommunications and information exchange between systems - Powerline communication(PLC) - High speed PLC medium access control(MAC) and physcial layer(PHY) - Part 1:General requirements
|
|
|
На языке оригинала
|
9072,00
|
|
| Страницы: ... / 53 / 54 / 55 / 56 / 57 / 58 / 59 / 60 / 61 / 62 / 63 / 64 / 65 / 66 ... / 95 |