| Обозначение | Заглавие на русском языке | Статус | Язык документа | Цена (с НДС 20%) в рублях |
|
|
Information technology. Application security. Application security management process
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Application security. Protocols and application security controls data structure
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Application security. Case studies
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Application security. Assurance prediction framework
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security incident management. Principles of incident management
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security incident management. Guidelines to plan and prepare for incident response
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Information security incident management. Guidelines for ICT incident response operations
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security for supplier relationships. Overview and concepts
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security for supplier relationships. Requirements
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security for supplier relationships. Guidelines for information and communication technology supply chain security
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Information security for supplier relationships. Guidelines for security of cloud services
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Security techniques. Selection, deployment and operations of intrusion detection and prevention systems (IDPS)
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Electronic discovery. Overview and concepts
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Tracked Changes. Information technology. Electronic discovery. Overview and concepts
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Electronic discovery. Guidance for governance and management of electronic discovery
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Electronic discovery. Code of practice for electronic discovery
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Information technology. Electronic discovery. Technical readiness
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Security techniques. Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management. Requirements and guidelines
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management kit
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
|
|
Security techniques. Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management. Requirements and guidelines
|
|
|
На языке оригинала
|
Пишите на gost@gostinfo.ru
|
|
| Страницы: ... / 1946 / 1947 / 1948 / 1949 / 1950 / 1951 / 1952 / 1953 / 1954 / 1955 / 1956 / 1957 / 1958 / 1959 ... / 2197 |