Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GA/T 1735.1-2020 |
Technical specifications of inspection tools for cybersecurity classified protection—Part 1: General safety inspection tools |
|
via email in
1 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 32918.1-2016 |
Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 1:General |
(USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 33131-2016 |
Information security technology—Specification for IP storage network security based on IPSec |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 37046-2018 |
Information security techniques—Assessment criteria for disaster recovery service capability |
(USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 25059-2010 |
Information security technology—Public Key Infrastructure—Simple Online Certificate Status Protocol |
(USD) |
via email in
1-3 business day
|
|
|
GB/T 37964-2019 |
Information security technology—Guide for de-identifying personal information |
(USD) |
via email in
1 business day
|
VALID
|
|
GB/T 37972-2019 |
Information security technology—Operation supervision framework of cloud computing service |
(USD) |
via email in
1 business day
|
VALID
|
|
GB/T 38644-2020 |
Information security technology—Trusted computing—Testing method of trusted connect |
(USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 37973-2019 |
Information security technology—Big data security management guide |
(USD) |
via email in
1 business day
|
VALID
|
|
GB/Z 38649-2020 |
Information security technology—Guide of information security assurance framework for smartcities |
(USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
GB/T 36629.1-2018 |
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 1:Security technique requirements for reader |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 27422-2019 |
Conformity assessment—Requirements for bodies providing audit and certification of business continuity management systems |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25070-2019 |
Information security technology—Technical requirements of security design for classified protection of cybersecurity |
(USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 32920-2016 |
Information technology—Security techniques—Information security management for inter-sector and inter-organizational communications |
(USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 32905-2016 |
Information security techniques—SM3 cryptographic hash algorithm |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36950-2018 |
Information security technology—Security technical requirements of smart card(EAL4+) |
(USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 37095-2018 |
Information security technology—Security basic technical requirements for office information systems |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36630.4-2018 |
Information security technology—Controllability evaluation index for security of information technology products—Part 4:Office suite |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36618-2018 |
Information security technology—Specification for financial information service security |
(USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36959-2018 |
Information security technology—Capability requirements and evaluation specification for assessment organization of classified protection of cybersecurity |
(USD) |
via email in
1-5 business day
|
VALID
|
|
|