Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 31168-2014 Information Security Technology - Security Capability Requirements of Cloud Computing Services 400.0 via email in 1 business day valid
GB/T 22081-2008 Information technology—Security techniques—Code of practice for information security management 1110.0 via email in 1~3 business day abolished
GB/T 20271-2006 Information security technology Common security techniques requirement for information system 360.0 via email in 1 business day valid
GB/T 25062-2010 Information security technology—Authentication and authorization—Role-based access control model and management specification 480.0 via email in 1~3 business day valid
GB/T 20277-2006 Information security technology Testing and evaluation techniques of separation components of network and terminal equipment 1020.0 via email in 1~10 business day abolished
GB/T 32914-2016 Information security technology - Information security service provider management requirements 180.0 via email in 1~3 business day valid
GB/T 31495.2-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 2:Indicator system 570.0 via email in 1~8 business day valid
GB/T 32927-2016 Information security technology - Security architecture of mobile smart terminal 180.0 via email in business day valid
GB/T 15851-1995 Information technology-Security techniques-Digital signature scheme giving message recovery 285.0 via email in 1~3 business day valid
GB/T 28450-2012 Information security technology—Guidelines for information security management system auditing 480.0 via email in 1~3 business day valid
GB/T 33565-2017 Information security technology―Security technology requirements for wireless local area network(wlan) access system(EAL2+) 830.0 via email in 1~8 business day valid
GB/T 20278-2013 Information Security Technology - Security Technical Requirements for Network Vulnerability Scanners 130.0 via email in 1 business day valid
GB/T 31508-2015 Information security techniques―Public key infrastructure―Digital certificate policies classification and grading specification 630.0 via email in 1~8 business day valid
GB/T 25064-2010 Information security technology—Public key infrastructure—Electronic signature formats specification 600.0 via email in 1~3 business day valid
GB/Z 24294.1-2018 Information security technology—Guide of implementation for internet-basede-government information security—Part 1:General 500.0 via email in 1~5 business day valid
GB/T 17902.3-2005 Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms 300.0 via email in 1~3 business day valid
GB/T 17964-2008 Information technology - Security techniques - Modes of operation for a block cipher 260.0 via email in 1 business day valid
GB/T 31501-2015 Information security technology―Authentication and authorization―Specification for authorization application programming decision interface 690.0 via email in 1~8 business day valid
GB/T 28452-2012 Information security technology—Common security technique requirement for application software system 750.0 via email in 1~3 business day valid
GB/T 32918.1-2016 Information security techniques - Elliptic Curve public - key cryptography - Part 1: General 800.0 via email in 1~8 business day valid
About Us | Contact Us | Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | Send me a messageQQ: 672269886
Copyright: Codeofchina Inc 2008-2020