Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 32915-2016 Information security technology - Binary sequence randomness detection method 385.0 via email in 1~5 business day valid
GB/T 22240-2008 Information security technology—Classification guide for classified protection of information systems security 210.0 via email in 1~3 business day valid
GB/T 28451-2012 Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products 870.0 via email in 1~3 business day valid
GB 15843.2-1997 Information technology―Security techniques―Entity authentication―Part 2: Mechanisms using symmetric encipherment algorithms 165.0 via email in 1~3 business day abolished
LD/T 30.5-2009 Human resources and social security electronic authentication system - Part 5: Specification of digital certificate storage medium 480.0 via email in 1~3 business day valid
GB/T 31497-2015 Information technology―Security techniques―Information security management―Measurement 710.0 via email in 1~8 business day valid
GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements 1515.0 via email in 1~10 business day abolished
GB/T 18018-2007 Information security technology—Technical requirements for router security 240.0 via email in 1~3 business day valid
GB/T 20979-2007 Information security technolgy—Technical requirments for iris recognition system 390.0 via email in 1~3 business day valid
GB/T 31507-2015 Information security technology―General testing guide for security of smart card 630.0 via email in 1~8 business day valid
GB/T 17903.3-2008 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques 150.0 via email in 1~3 business day valid
GB/T 17903.3-1999 Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques 165.0 via email in 1~3 business day abolished
GB/T 28458-2012 Information security technology—Vulnerability identification and description specification 110.0 via email in 1~3 business day valid
GB/T 17964-2000 Information technology--Security techniques--Modes of operation for an n-bit block cipher 225.0 via email in 1~3 business day abolished
GB/T 22239-2008 Ionformation secuiryt technology - Baseline for classified protection of information system security 435.0 via email in 1~2 business day valid
GB/T 17903.1-1999 Information technology--Security techniques--Non-repudiation--Part 1:General 240.0 via email in 1~3 business day abolished
GB/T 15851-1995 Information technology-Security techniques-Digital signature scheme giving message recovery 285.0 via email in 1~3 business day valid
GB/T 15843.3-2008 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques 150.0 via email in 1~3 business day abolished
GB/T 29765-2013 Information security technology—Technical requirements and testing and evaluating method for data backup and recovery products 660.0 via email in 1~3 business day valid
GB/T 31502-2015 Information security technology�Security protect framework of electronic payment system 1290.0 via email in 1~10 business day valid
About Us | Contact Us | Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | Send me a messageQQ: 672269886
Copyright: Codeofchina Inc 2008-2020