Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 32409-2015 |
Information technology―Traditional Mongolian software engineering terminology |
$4065.00 |
via email in 1~10 business day |
valid,,2017-1-1 |
|
GB/T 32412-2015 |
Information technology―Special and quotative Uyghur,Kazakh and Kirghiz function characters |
$100.00 |
via email in 1~3 business day |
valid,,2017-1-1 |
|
GB/T 32629-2016 |
Information technology - Biometric interfacing protocol for application programming interface |
$4410.00 |
via email in 1~10 business day |
valid,,2016-11-1 |
|
GB/T 32636.1-2016 |
Information technology—Universal multiple-octet coded character set (basic multilingual plane)—28 dot matrix font of Chinese ideogram—Part 1: Song ti |
$1090.00 |
via email in 1~10 business day |
valid,,2016-12-1 |
|
GB/T 32656-2016 |
Data format of the calendar and schedule |
$370.00 |
via email in 1~5 business day |
valid,,2016-11-1 |
|
GB/T 32903-2016 |
Information technology refers to the vein recognition system refers to the vein image data format |
$365.00 |
via email in 1~3 business day |
superseded,2023-7-1,2017-3-1 |
|
GB/T 32905-2016 |
Information security technology SM3 cryptographic hash algorithm |
$240.00 |
immediately |
valid,,2017-3-1 |
|
GB/T 32912-2016 |
Information technology - Traditional Mongolian words - Word form specification - Basic set |
$350.00 |
via email in 1~10 business day |
valid,,2017-3-1 |
|
GB/T 32913-2016 |
Information Technology Meta Object Facility (MOF) |
$2745.00 |
via email in 1~10 business day |
valid,,2017-3-1 |
|
GB/T 32914-2016 |
Information security technology - Information security service provider management requirements |
$160.00 |
via email in 1~3 business day |
superseded,2024-4-1,2017-3-1 |
|
GB/T 32915-2016 |
Information security technology - Binary sequence randomness detection method |
$140.00 |
via email in 1~5 business day |
valid,,2017-3-1 |
|
GB/T 32917-2016 |
KeyWord: security requirements; testing and evaluation methods; WEB application firewall; |
$600.00 |
via email in 1~5 business day |
superseded,2020-11-1,2017-3-1 |
|
GB/T 32918.1-2016 |
Information security techniques - Elliptic Curve public - key cryptography - Part 1: General |
$360.00 |
immediately |
valid,,2017-3-1 |
|
GB/T 32918.5-2017 |
Information security technology―Public key cryptographic algorithm SM2 based on elliptic curves―Part 5:Parameter definition |
$160.00 |
immediately |
valid,,2017-12-1 |
|
GB/T 32919-2016 |
Information security - Industrial control systems - Guidelines for the application of security controls |
$1510.00 |
via email in 1~10 business day |
valid,,2017-3-1 |
|
GB/T 32920-2016 |
Information technology - Security techniques - Information security management for inter-sector and inter-organizational communications |
$490.00 |
via email in 1~5 business day |
superseded,2023-12-1,2017-3-1 |
|
GB/T 32922-2016 |
Information security technology - Baseline and implementation guide of IPSec VPN securing access |
$250.00 |
via email in 1~3 business day |
superseded,2023-10-1,2017-3-1 |
|
GB/T 32927-2016 |
Information security technology - Security architecture of mobile smart terminal |
$160.00 |
via email in 1~3 business day |
valid,,2017-3-1 |
|
GB/T 33113-2016 |
Specification on informatlon coding of water resources management object |
$220.00 |
via email in 1~3 business day |
valid,,2017-5-1 |
|
GB/T 33131-2016 |
Information security technology一Specification for IP storage network security based on IPSec |
$220.00 |
via email in 1~3 business day |
valid,,2017-5-1 |
|
|