Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 18018-2007 Information security technology—Technical requirements for router security $240.00 via email in 1~3 business day superseded
GB/T 18018-2019 Information security technology—Technical requirement for router security $250.00 via email in 1~3 business day valid
GB/T 18238.1-2000 Information technology - Security techniques-Hash-function - Part 1: General $135.00 via email in 1~3 business day to be abolished
GB/T 18238.2-2002 Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher $250.00 via email in 1~3 business day to be abolished
GB/T 18238.3-2002 Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions $600.00 via email in 1~3 business day to be abolished
GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model $550.00 via email in 1~5 business day superseded
GB/T 18336.1-2015 Information technology―Security techniques―Evaluation criteria for IT security―Part 1:Introduction and general model $140.00 via email in 1~5 business day superseded
GB/T 18336.1-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 1: Introduction and general model $1950.00 via email in 1~3 business day valid
GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements $2475.00 via email in 1~10 business day superseded
GB/T 18336.2-2015 Information technology―Security techniques―Evaluation criteria for IT security―Part 2:Security functional components $490.00 via email in 1~10 business day superseded
GB/T 18336.2-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 2: Security functional components $3945.00 via email in 1~3 business day valid
GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements $1510.00 via email in 1~10 business day superseded
GB/T 18336.3-2015 Information technology―Security techniques―Evaluation criteria for IT security―Part 3:Security assurance components $490.00 via email in 1~10 business day superseded
GB/T 18336.3-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 3: Security assurance components $2475.00 via email in 1~8 business day valid
GB/T 18336.4-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 4:Framework for specification of evaluation methods and activities $450.00 via email in 1~5 business day valid
GB/T 18336.5-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 5:Pre-defined packages of security requirements $585.00 via email in 1~5 business day valid
GB/T 19715.1-2005 Informaition technology - Guidelines for the management of IT security - Part 1 : Concepts and models of IT security $180.00 via email in 1~3 business day abolished
GB/T 19715.2-2005 Information technology - Guidelines for the management of IT Security - Part 2 : Managing and planning IT security $180.00 via email in 1~3 business day abolished
GB/T 19716-2005 Information technology-Code of practice for information security management $1759.00 immediately abolished
GB/T 20009-2019 Information security technology—Security evaluation criteria for database management system $580.00 via email in 1~5 business day valid
* Related standard quantity: * Page quantity: * Current: * First Previous [1][2][3][4][5][6][7][8][9][10][11] Next End



About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: TransForyou Co., Ltd. 2008-2040