Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 18238.1-2000 Information technology - Security techniques-Hash-function - Part 1: General 85.0 via email in 1~3 business day valid
GB/T 32915-2016 Information security technology - Binary sequence randomness detection method 385.0 via email in 1~5 business day valid
GB/Z 29830.1-2013 Information Technology - Security Technology - A Framework for IT Security Assurance - Part 1: Overview and Framework 330.0 via email in 1~3 business day valid
GB/T 30282-2013 Information Security Technology - Techniques Requirements and Testing and Evaluation Approaches for Anti-spam Product 330.0 via email in 1~3 business day valid
GB/T 29246-2012 Information technology—Security techniques—Information security management systems—Overview and vocabulary 310.0 via email in 1~3 business day to be abolished
GB/T 33562-2017 Information security technology―Secure domain name system deployment guide 344.0 via email in 1~3 business day valid
GB/T 30269.601-2016 Information technology-Sensor network-Part 601:Information security:General technical specifications 645.0 via email in 1~8 business day valid
GB/T 35291-2017 Information security technology―Cryptography token application interface specification 690.0 via email in 1~8 business day to be valid
GB 15843.2-1997 Information technology―Security techniques―Entity authentication―Part 2: Mechanisms using symmetric encipherment algorithms 165.0 via email in 1~3 business day abolished
GB/T 20519-2006 Information security technology - Public key infrastructures - Privilege Management Center technical specification 420.0 via email in 1~5 business day abolished
GB/T 30284-2013 Technical Requirements of Security for Operating System in Smart Mobile Terminal (EAL2) 620.0 via email in 1~3 business day valid
GB/T 31497-2015 Information technology―Security techniques―Information security management―Measurement 710.0 via email in 1~8 business day valid
GB/T 25068.5-2010 Information technology—Security techniques—IT network security—Part 5:Securing communications across networks using virtual private networks 260.0 via email in 1~3 business day valid
GB/T 17902.3-2005 Information technology - Security techniques - Digital signatures with appendix - Part 3 : Certificate-based mechanisms 300.0 via email in 1~3 business day valid
GB/T 31507-2015 Information security technology―General testing guide for security of smart card 630.0 via email in 1~8 business day valid
GB/T 28456-2012 Testing specification for applications of IPsec protocol 1260.0 via email in 1~3 business day valid
GB/T 25069-2010 Information security technology—Glossary 1080.0 via email in 1~3 business day valid
GB/T 35277-2017 Information security technology―Security technical requirements and testing and evaluation approaches for antivirus gateway products 615.0 via email in 1~8 business day valid
GB/T 17903.3-1999 Information technology--Security techniques--Non-repudiation--Part 3:Mechanisms using asymmetric techniques 165.0 via email in 1~3 business day abolished
GB/T 20984-2007 Information security technology-Risk assessment specification for information security 450.0 via email in 1~3 business day valid
About Us | Contact Us | Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | Send me a messageQQ: 672269886
Copyright: Codeofchina Inc 2008-2020