![]() |
Chinese Standard Classification
Professional Classification
ICS Classification
Latest
|
| Position: Search | valid to be valid superseded to be superseded abolished to be abolished |
| Search |
|
GB/T 36466-2018 Information security technology—Implementation guide to risk assessment of industrial control systems
Issued on: 2018-06-07 Price(USD): 670.0 |
|
GB/T 20518-2018 Information security technology—Public key infrastructure—Digital certificate format
Issued on: 2018-06-07 Price(USD): 750.0 |
|
GB/T 35274-2017 Information security technology—Security capability requirements for big data services
Issued on: 2017-12-29 Price(USD): 360.0 |
|
GB/T 36470-2018 Information security technology—Common security functional requirements for data acquisition and control field devices of industrial control systems
Issued on: 2018-06-07 Price(USD): 610.0 |
|
GB/T 25056-2018 Information security technology—Specifications of cryptograph and related security technology for certificate authentication system
Issued on: 2018-06-07 Price(USD): 550.0 |
|
GB/Z 24294.1-2018 Information security technology—Guide of implementation for internet-basede-government information security—Part 1:General
Issued on: 2018-03-15 Price(USD): 430.0 |
|
GM/T 0054-2018 General requirements for information system cryptography application
Issued on: 2018-02-08 Price(USD): 260.0 |
|
GB/T 20985.1-2017 Information technology—Security techniques—Information security incident management—Part 1:Principles of incident management
Issued on: 2017-12-29 Price(USD): 310.0 |
|
GB/T 35787-2017 Security technical requirement for the read-write equipment ofthe electronic identification of motor vehicles
Issued on: 2017-11-29 Price(USD): 80.0 |
|
GB/T 31495.2-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 2:Indicator system
Issued on: 2015-05-15 Price(USD): 610.0 |
|
GB/T 15843.2-2017 Information technology―Security techniques―Entity authentication―Part 2:Mechanisms using symmetric encipherment algorithms
Issued on: 2017-12-29 Price(USD): 220.0 |
|
GB/T 20276-2016 Information security technology - Security requirements for embedded software in IC card with CPU
Issued on: 2016-08-29 Price(USD): 500.0 |
|
GB/T 17903.2-1999 Information technology--Security techniques--Non-repudiation--Part 2:Mechanisms using symmetric techniques
Issued on: 1999-01-01 Price(USD): 240.0 |
|
GB/T 31495.1-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 1:Concepts and model
Issued on: 2015-05-15 Price(USD): 160.0 |
|
GB/T 25056-2010 Information security techniques—Specifications of cryptograph and related security technology for certificate authentication system
Issued on: 2010-9-2 Price(USD): 1140.0 |
|
GM/T 0041-2015 Cryptographic test specification for smart card
Issued on: 2025-07-01 Price(USD): 140.0 |
|
LD/T 30.4-2009 Human resources and social security electronic authentication system—Part 4:Management specification of digital certificate application
Issued on: 2009-12-14 Price(USD): 480.0 |
|
GB/T 31496-2015 Information technology―Security techniques―Information security management system implementation guidance
Issued on: 2015-05-15 Price(USD): 690.0 |
|
GB/T 15277-1994 Information processing--Modes of operation for a 64-bit block cipher algorithm
Issued on: 1994-01-02 Price(USD): 130.0 |
|
GB/T 35275-2017 Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specification
Issued on: 2017-12-29 Price(USD): 220.0 |
| Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886 | ||
| Copyright: Beijing COC Tech Co., Ltd. 2008-2040 | ||