Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 30270-2013 |
Information Technology - Security Technology - Methodology for IT Security Evaluation |
$2980.00 |
via email in 1~10 business day |
superseded,2024-11-1,2014-7-15 |
|
GB/T 30271-2013 |
Information Security Technology - Assessment Criteria for Information Security Service Capability |
$930.00 |
via email in 1~3 business day |
valid,,2014-7-15 |
|
GB/T 30272-2013 |
Information Security Technology - Public Key Infrastructure - Testing and Evaluation Guide on Standard Conformance |
$660.00 |
via email in 1~3 business day |
superseded,2022-5-1,2014-7-15 |
|
GB/T 30273-2013 |
Information Security Technology - Common Methodology for Information Systems Security Assurance Evaluation |
$1950.00 |
via email in 1~3 business day |
valid,,2014-7-15 |
|
GB/T 30274-2013 |
Information Security Techniques - Public Key Infrastructure - Specification of Testing on Application Interfaces of Electronic Signature Card |
$210.00 |
via email in 1~3 business day |
abolished2017-12-19,,2014-7-15 |
|
GB/T 30275-2013 |
Information Security Technology - Authentication and Authorization - Authentication Middleware Framework and Interface Specification |
$390.00 |
via email in 1~3 business day |
valid,,2014-7-15 |
|
GB/T 30276-2013 |
Information Security Technology - Vulnerability Management Criterion Specification |
$160.00 |
via email in 1~3 business day |
superseded,2021-6-1,2014-7-15 |
|
GB/T 30276-2020 |
Information security technology—Specification for cybersecurity vulnerability management |
$150.00 |
via email in 1~3 business day |
valid,,2021-6-1 |
|
GB/T 30277-2013 |
Information Security Technology - Public Key Infrastructures - Certification Authentication Institution Identity Code Specification |
$210.00 |
via email in 1~3 business day |
abolished2017-12-19,,2014-7-15 |
|
GB/T 30278-2013 |
Information Security Technology - Chinese Government Desktop Core Configuration Specifications |
$450.00 |
via email in 1~3 business day |
to be superseded,2025-6-1,2014-7-15 |
|
GB/T 30279-2013 |
Information Security Technology - Vulnerability Classification Guide |
$180.00 |
via email in 1~3 business day |
superseded,2021-6-1,2014-7-15 |
|
GB/T 30279-2020 |
Information security technology—Guidelines for categorization and classification of cybersecurity vulnerability |
$345.00 |
via email in 1~5 business day |
valid,,2021-6-1 |
|
GB/T 30280-2013 |
Information Security Technology - Authentication and Authorization - Geospatial Extensible Access Control Markup Language |
$330.00 |
via email in 1~3 business day |
valid,,2014-7-15 |
|
GB/T 30281-2013 |
Information Security Technology - Authentication and Authorization - Extensible Access Control Markup Language (XACML) |
$1350.00 |
via email in 1~3 business day |
valid,,2014-7-15 |
|
GB/T 30282-2013 |
Information Security Technology - Techniques Requirements and Testing and Evaluation Approaches for Anti-spam Product |
$330.00 |
via email in 1~3 business day |
superseded,2023-12-1,2014-7-15 |
|
GB/T 30283-2013 |
Information Security Technology - Information Security Service - Category |
$270.00 |
via email in 1~3 business day |
superseded,2022-11-1,2014-7-15 |
|
GB/T 30284-2013 |
Technical Requirements of Security for Operating System in Smart Mobile Terminal (EAL2) |
$660.00 |
via email in 1~3 business day |
superseded,2020-11-1,2014-7-15 |
|
GB/T 30284-2020 |
Information security techniques—Security technical requirements for operating system on smart mobile terminal |
$630.00 |
via email in 1~5 business day |
valid,,2020-11-1 |
|
GB/T 30285-2013 |
Information Security Technology - Construction and Sustain Management Specifications of Disaster Recovery Center |
$390.00 |
via email in 1~3 business day |
valid,,2014-7-15 |
|
GB/T 30522-2014 |
Science and Technology Infrastructure - Metadata Standardization Principle and Method |
$330.00 |
via email in 1~3 business day |
valid,,2014-8-1 |
|
|