Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 32409-2015 Information technology―Traditional Mongolian software engineering terminology $4065.00 via email in 1~10 business day valid
GB/T 32412-2015 Information technology―Special and quotative Uyghur,Kazakh and Kirghiz function characters $100.00 via email in 1~3 business day valid
GB/T 32629-2016 Information technology - Biometric interfacing protocol for application programming interface $4410.00 via email in 1~10 business day valid
GB/T 32636.1-2016 Information technology—Universal multiple-octet coded character set (basic multilingual plane)—28 dot matrix font of Chinese ideogram—Part 1: Song ti $1090.00 via email in 1~10 business day valid
GB/T 32656-2016 Data format of the calendar and schedule $370.00 via email in 1~5 business day valid
GB/T 32903-2016 Information technology refers to the vein recognition system refers to the vein image data format $365.00 via email in 1~3 business day superseded
GB/T 32905-2016 Information security technology SM3 cryptographic hash algorithm $240.00 immediately valid
GB/T 32912-2016 Information technology - Traditional Mongolian words - Word form specification - Basic set $350.00 via email in 1~10 business day valid
GB/T 32913-2016 Information Technology Meta Object Facility (MOF) $2745.00 via email in 1~10 business day valid
GB/T 32914-2016 Information security technology - Information security service provider management requirements $160.00 via email in 1~3 business day superseded
GB/T 32915-2016 Information security technology - Binary sequence randomness detection method $140.00 via email in 1~5 business day valid
GB/T 32917-2016 KeyWord: security requirements; testing and evaluation methods; WEB application firewall; $600.00 via email in 1~5 business day superseded
GB/T 32918.1-2016 Information security techniques - Elliptic Curve public - key cryptography - Part 1: General $360.00 immediately valid
GB/T 32918.5-2017 Information security technology―Public key cryptographic algorithm SM2 based on elliptic curves―Part 5:Parameter definition $160.00 immediately valid
GB/T 32919-2016 Information security - Industrial control systems - Guidelines for the application of security controls $1510.00 via email in 1~10 business day valid
GB/T 32920-2016 Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications $490.00 via email in 1~5 business day superseded
GB/T 32922-2016 Information security technology - Baseline and implementation guide of IPSec VPN securing access $250.00 via email in 1~3 business day superseded
GB/T 32927-2016 Information security technology - Security architecture of mobile smart terminal $160.00 via email in 1~3 business day valid
GB/T 33113-2016 Specification on informatlon coding of water resources management object $220.00 via email in 1~3 business day valid
GB/T 33131-2016 Information security technology一Specification for IP storage network security based on IPSec $220.00 via email in 1~3 business day valid
* Related standard quantity: * Page quantity: * Current: * First Previous [64][65][66][67][68][69][70][71][72][73][74] Next End



About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: TransForyou Co., Ltd. 2008-2040