| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information security, cybersecurity and privacy protection. Guidelines for information security management systems auditing
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Tracked Changes. Information security, cybersecurity and privacy protection. Guidelines for information security management systems auditing
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information security, cybersecurity and privacy protection. Sector-specific application of ISO/IEC 27001. Requirements
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Tracked Changes. Information technology. Security techniques. Information security management for inter-sector and inter-organizational communications
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Tracked Changes. Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information security, cybersecurity and privacy protection. Governance of information security
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Competence requirements for information security management systems professionals
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Guidelines for cybersecurity
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Network security. Overview and concepts
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Tracked Changes. Information technology. Security techniques. Network security. Overview and concepts
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Network security. Guidelines for the design and implementation of network security
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Network security. Reference networking scenarios. Threats, design techniques and control issues
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Network security. Securing communications between networks using security gateways
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Network security. Securing communications across networks using Virtual Private Networks (VPNs)
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Network security. Securing wireless IP network access
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Application security. Overview and concepts
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Application security. Organization normative framework
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
| Страницы: ... / 1945 / 1946 / 1947 / 1948 / 1949 / 1950 / 1951 / 1952 / 1953 / 1954 / 1955 / 1956 / 1957 / 1958 ... / 2197 |