Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 31505-2015 |
Information security technology―Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall |
$490.00 |
via email in 1~5 business day |
superseded,2020-11-1,2016-1-1 |
|
GB/T 31506-2015 |
Information security technology―Security technology guidelines for web portal system of government |
$430.00 |
via email in 1~5 business day |
superseded,2022-11-1,2016-1-1 |
|
GB/T 31506-2022 |
Information security technology—Security guidelines for website system of government affairs |
$375.00 |
via email in 1~5 business day |
valid,,2022-11-1 |
|
GB/T 31507-2015 |
Information security technology―General testing guide for security of smart card |
$670.00 |
via email in 1~5 business day |
valid,,2016-1-1 |
|
GB/T 31508-2015 |
Information security techniques―Public key infrastructure―Digital certificate policies classification and grading specification |
$630.00 |
via email in 1~5 business day |
valid,,2016-1-1 |
|
GB/T 31509-2015 |
Information security technology―Guide of implementation for information security risk assessment |
$450.00 |
via email in 1~5 business day |
valid,,2016-1-1 |
|
GB/T 31722-2015 |
Information technology―Security techniques―Information security risk management |
$490.00 |
immediately |
valid,,2016-2-1 |
|
GB/T 32213-2015 |
Information security technology―Public key infrastructure―Specification for remote password authentication and key establishment |
$610.00 |
via email in 1~5 business day |
valid,,2016-8-1 |
|
GB/T 32905-2016 |
Information security technology SM3 cryptographic hash algorithm |
$240.00 |
immediately |
valid,,2017-3-1 |
|
GB/T 32914-2016 |
Information security technology - Information security service provider management requirements |
$160.00 |
via email in 1~3 business day |
superseded,2024-4-1,2017-3-1 |
|
GB/T 32914-2023 |
Information security technology —Capability requirements of cybersecurity service |
$320.00 |
via email in 1~3 business day |
valid,,2024-4-1 |
|
GB/T 32915-2016 |
Information security technology - Binary sequence randomness detection method |
$140.00 |
via email in 1~5 business day |
valid,,2017-3-1 |
|
GB/T 32916-2023 |
Information security techniques—Guidelines for the assessment of information security controls |
$1275.00 |
via email in 1~5 business day |
valid,,2024-4-1 |
|
GB/T 32917-2016 |
KeyWord: security requirements; testing and evaluation methods; WEB application firewall; |
$600.00 |
via email in 1~5 business day |
superseded,2020-11-1,2017-3-1 |
|
GB/T 32918.1-2016 |
Information security techniques - Elliptic Curve public - key cryptography - Part 1: General |
$360.00 |
immediately |
valid,,2017-3-1 |
|
GB/T 32918.5-2017 |
Information security technology―Public key cryptographic algorithm SM2 based on elliptic curves―Part 5:Parameter definition |
$160.00 |
immediately |
valid,,2017-12-1 |
|
GB/T 32919-2016 |
Information security - Industrial control systems - Guidelines for the application of security controls |
$1510.00 |
via email in 1~5 business day |
valid,,2017-3-1 |
|
GB/T 32920-2016 |
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications |
$490.00 |
via email in 1~5 business day |
superseded,2023-12-1,2017-3-1 |
|
GB/T 32920-2023 |
Information security technology—Information security management for inter-sector and inter-organizational communications |
$435.00 |
via email in 1~3 business day |
valid,,2023-12-1 |
|
GB/T 32922-2016 |
Information security technology - Baseline and implementation guide of IPSec VPN securing access |
$250.00 |
via email in 1~3 business day |
superseded,2023-10-1,2017-3-1 |
|
* Related standard quantity: * Page quantity: *
Current: * First
Previous
[9][10][11][12][13][14][15][16][17][18][19]
Next
End
* Related standard quantity: * Page quantity: *
Current: * First
Previous
[9][10][11][12][13][14][15][16][17][18][19]
Next
End
|