Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 19668.6-2007 |
Information system project surveillance specification—Part 6:Information system project security surveillance specification |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GB/T 5271.16-2008 |
Information technology - Vocabulary Part 16: Information theory |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 12200.2-1994 |
Chinese information processing-Vocabulary-Part 02: Chinese and Chinese character |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 28451-2012 |
Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products |
(USD) |
via email in
1-8 business day
|
VALID
|
|
GA/T 1481.5-2018 |
BeiDou/global navigation satellite system for police application—Part 5:Mobile positioning terminal |
(USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 17964-2000 |
Information technology--Security techniques--Modes of operation for an n-bit block cipher |
(USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/T 36107-2018 |
Data exchange interface of the unified social credit identifier for legal entities and other organizations |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 28452-2012 |
Information security technology—Common security technique requirement for application software system |
(USD) |
via email in
1-8 business day
|
VALID
|
|
GA 397.3-2002 |
Technical standard of economic crime case managemert information system Part 3: Composite standard of case name |
(USD) |
via email in
1-3 business day
|
|
|
GB/T 36105-2018 |
Code allocation specification of the unified social credit identifier for legal entities and other organizations |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 5271.14-1985 |
Data processing-Vocabulary; Section 14: Reliability,maintenance and availability |
(USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GA/T 403.1-2002 |
Information technology--Technical requirements for intrusion detection products--Part 1:Network-based products |
(USD) |
via email in
1-3 business day
|
|
|
GB/T 25068.5-2010 |
Information technology—Security techniques—IT network security—Part 5:Securing communications across networks using virtual private networks |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 32910.2-2017 |
|
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GA/T 493-2004 |
Construction for police geographic information system |
(USD) |
via email in
1-8 business day
|
VALID
|
|
GA 398.6-2002 |
The management information code on economic crime case Part 6: Codes for the reason of supplement case registering |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25066-2010 |
Information security technology—Type and code of information security product |
(USD) |
via email in
1-3 business day
|
VALID
|
|
SL 341-2006 |
Technical code on information management of water and soil conservation |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25068.4-2010 |
Information technology—Security techniques—IT network security—Part 4:Securing remote access |
(USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 5271.18-2008 |
Information technology - Vocabulary Part 18: Distributed data processing |
(USD) |
via email in
1-3 business day
|
VALID
|
|
|