Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanism
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Time-stamping services - Part 2: Mechanisms producing independent tokens
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 1: General
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Cryptographic algorithms and security mechanisms conformance testing
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Authenticated encryption
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Security evaluation of biometrics
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Systems Security Engineering - Capability Maturity ModelВ®(SSE-CMMВ®)
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Biometric information protection
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - A framework for identity management - Part 1: Terminology and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Authentication context for biometrics
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management systems - Overview and vocabulary
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management systems - Requirements
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information security, cybersecurity and privacy protection - Information security controls
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management - Measurement
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: 1 / 2 / 3 / 4 |