Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 17964-2000 Information technology--Security techniques--Modes of operation for an n-bit block cipher $220.00 via email in 1~3 business day superseded
GB/T 17964-2008 Information technology - Security techniques - Modes of operation for a block cipher $140.00 immediately superseded
GB/T 18018-1999 Security requirements for router $250.00 via email in 1~3 business day superseded
GB/T 18018-2007 Information security technology—Technical requirements for router security $240.00 via email in 1~3 business day superseded
GB/T 18018-2019 Information security technology—Technical requirement for router security $250.00 via email in 1~3 business day valid
GB/T 18238.1-2000 Information technology - Security techniques-Hash-function - Part 1: General $135.00 via email in 1~3 business day abolished
GB/T 18238.1-2024 Cybersecurity technology—Hash-functions—Part 1: General $270.00 via email in 1~3 business day valid
GB/T 18238.2-2002 Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher $250.00 via email in 1~3 business day abolished
GB/T 18238.2-2024 Cybersecurity technology—Hash-functions—Part 2: Hash-functions using a block cipher $435.00 via email in 1~5 business day valid
GB/T 18238.3-2002 Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions $600.00 via email in 1~3 business day abolished
GB/T 18238.3-2024 Cybersecurity technology—Hash-functions—Part 3: Dedicated hash-functions $190.00 via email in 1~3 business day valid
GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model $550.00 via email in 1~5 business day superseded
GB/T 18336.1-2015 Information technology―Security techniques―Evaluation criteria for IT security―Part 1:Introduction and general model $140.00 via email in 1~5 business day superseded
GB/T 18336.1-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 1: Introduction and general model $1950.00 via email in 1~3 business day valid
GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements $2475.00 via email in 1~5 business day superseded
GB/T 18336.2-2015 Information technology―Security techniques―Evaluation criteria for IT security―Part 2:Security functional components $490.00 via email in 1~5 business day superseded
GB/T 18336.2-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 2: Security functional components $3945.00 via email in 1~3 business day valid
GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements $1510.00 via email in 1~5 business day superseded
GB/T 18336.3-2015 Information technology―Security techniques―Evaluation criteria for IT security―Part 3:Security assurance components $490.00 via email in 1~5 business day superseded
GB/T 18336.3-2024 Cybersecurity technology—Evaluation criteria for IT security—Part 3: Security assurance components $2475.00 via email in 1~5 business day valid
* Related standard quantity: * Page quantity: * Current: * First Previous [1][2][3][4][5][6][7][8][9][10][11] Next End



About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: TransForyou Co., Ltd. 2008-2040