2025-12-21 216.73.216.41
Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 36644-2018 Information security technology—Methods for obtaining security attestations for digital signature applications 400.0 via email in 1~5 business day valid,,2019-4-1
GB/T 36639-2018 Information security technology—Trusted computing specification—Trusted support platform for server 250.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36635-2018 Information security technology—Basic requirements and implementation guide of network security monitoring 120.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36633-2018 Information security technology—Technical guide for identity authentication over network 370.0 via email in 1~5 business day valid,,2019-4-1
GB/T 36631-2018 Information security technology—Time stamp policy and time stamp practice rules 160.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36630.5-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 5:General purpose computer 220.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36630.4-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 4:Office suite 160.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36630.3-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 3:Operating system 220.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36630.2-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 2:Central processing unit 160.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36630.1-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 1:General principles 120.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36627-2018 Information security technology—Testing and evaluation technical guide for classified cybersecurity protection 250.0 via email in 1 business day valid,,2019-4-1
GB/T 36626-2018 Information security technology—Management guide for secure operation and maintenance of information systems 250.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36624-2018 Information technology—Security techniques—Authenticated encryption 340.0 via email in 1~5 business day valid,,2019-4-1
GB/T 36619-2018 Information security technology—Naming specification on domain names of chinese government organs and public institutions 160.0 via email in 1~3 business day valid,,2019-4-1
GB/T 36618-2018 Information security technology—Specification for financial information service security 210.0 via email in 1~3 business day valid,,2019-4-1
GB/T 34953.2-2018 Information technology—Security techniques—Anonymous entity authentication—Part 2:Mechanisms based on signatures using a group public key 600.0 via email in 1~5 business day valid,,2019-4-1
GB/T 15843.6-2018 Information technology—Security techniques—Entity authentication—Part 6:Mechanisms using manual data transfer 480.0 via email in 1~5 business day valid,,2019-4-1
GB/T 35279-2017 Information security technology—Security reference architecture of cloud computing 310.0 via email in 1~5 business day valid,,
GA/T 1390.5-2017 Information security technology—General requirements for classified protection of cyber security—Part 5:Special security requirements for industrial control system 1050.0 via email in 1~5 business day valid,,2017-5-8
GM/T 0064-2018 Cryptography test requirements for range controlled communication (RCC) 130.0 via email in 1~3 business day valid,,2018-8-20
Previous Page     Next Page



Code of China
Search

GB/T 36644-2018 Information security technology—Methods for obtaining security attestations for digital signature applications 
  Issued on: 2018-09-17   Price(USD): 400.0
GB/T 36639-2018 Information security technology—Trusted computing specification—Trusted support platform for server 
  Issued on: 2018-09-17   Price(USD): 250.0
GB/T 36635-2018 Information security technology—Basic requirements and implementation guide of network security monitoring 
  Issued on: 2018-09-17   Price(USD): 120.0
GB/T 36633-2018 Information security technology—Technical guide for identity authentication over network 
  Issued on: 2018-09-17   Price(USD): 370.0
GB/T 36631-2018 Information security technology—Time stamp policy and time stamp practice rules 
  Issued on: 2018-09-17   Price(USD): 160.0
GB/T 36630.5-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 5:General purpose computer 
  Issued on: 2018-09-17   Price(USD): 220.0
GB/T 36630.4-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 4:Office suite 
  Issued on: 2018-09-17   Price(USD): 160.0
GB/T 36630.3-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 3:Operating system 
  Issued on: 2018-09-17   Price(USD): 220.0
GB/T 36630.2-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 2:Central processing unit 
  Issued on: 2018-09-17   Price(USD): 160.0
GB/T 36630.1-2018 Information security technology—Controllability evaluation index for security of information technology products—Part 1:General principles 
  Issued on: 2018-09-17   Price(USD): 120.0
GB/T 36627-2018 Information security technology—Testing and evaluation technical guide for classified cybersecurity protection 
  Issued on: 2018-09-17   Price(USD): 250.0
GB/T 36626-2018 Information security technology—Management guide for secure operation and maintenance of information systems 
  Issued on: 2018-09-17   Price(USD): 250.0
GB/T 36624-2018 Information technology—Security techniques—Authenticated encryption 
  Issued on: 2018-09-17   Price(USD): 340.0
GB/T 36619-2018 Information security technology—Naming specification on domain names of chinese government organs and public institutions 
  Issued on: 2018-09-17   Price(USD): 160.0
GB/T 36618-2018 Information security technology—Specification for financial information service security 
  Issued on: 2018-09-17   Price(USD): 210.0
GB/T 34953.2-2018 Information technology—Security techniques—Anonymous entity authentication—Part 2:Mechanisms based on signatures using a group public key 
  Issued on: 2018-09-17   Price(USD): 600.0
GB/T 15843.6-2018 Information technology—Security techniques—Entity authentication—Part 6:Mechanisms using manual data transfer 
  Issued on: 2018-09-17   Price(USD): 480.0
GB/T 35279-2017 Information security technology—Security reference architecture of cloud computing 
  Issued on:   Price(USD): 310.0
GA/T 1390.5-2017 Information security technology—General requirements for classified protection of cyber security—Part 5:Special security requirements for industrial control system 
  Issued on: 2017-05-08   Price(USD): 1050.0
GM/T 0064-2018 Cryptography test requirements for range controlled communication (RCC) 
  Issued on: 2018-08-20   Price(USD): 130.0
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040