Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
Information technology - Security techniques - Information security risk management
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for information security management systems auditing
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for protection of personally identifiable information(PII) in public clouds acting as PII processors
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Competence requirements for information security management system professionals
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for cybersecurity
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 1: Overview and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Network security - Part 2: Guidelines for the design and implementation of network security
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Application security - Part 1: Overview and concepts
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Information security incident management
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Security techniques - Extension to KS X ISO/IEC 27001 and KS X ISO/IEC 27002 for privacy information management - Requirements and guidelines
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Entity authentication assurance framework
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Verification of cryptographic protocols
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Guidelines for privacy impact assessment
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Signcryption
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Code of practice for personally identifiable information protection
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
Information technology - Security techniques - Requirements for partially anonymous, partially unlinkable authentication
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
Страницы: 1 / 2 / 3 / 4 |