code of china Chinese Classification Professional Classification ICS Classification Latest News

LoginRegister
Position: Standard Search VALID TO BE VALID SUPERSEDED TO BE SUPERSEDED ABOLISHED TO BE ABOLISHED
Standard No. Title Price(USD) Delivery Status Add To Cart
GB/T 15843.2-2008 Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm (USD) via email in 1-3 business day ABOLISHED
GB/T 20277-2006 Information security technology Testing and evaluation techniques of separation components of network and terminal equipment (USD) via email in 1-8 business day ABOLISHED
GB/T 18336.1-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 1:Introduction and general model (USD) via email in 1-8 business day VALID
GB/T 35278-2017 Information security technology—Technical requirements for mobile terminal security protection (USD) via email in 1-5 business day VALID
GB/T 15843.4-2008 Information technology - Security techniques - Entity authentication - Part 4:Mechanisms using a cryptographic check function (USD) via email in 1-3 business day VALID
GB/T 25060-2010 Information security techniques—Public Key Infrastructure—Interface specification of X.509 digital certificates application (USD) via email in 1-3 business day
GB/T 25067-2010 Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems (USD) via email in 1-5 business day ABOLISHED
GB/T 35290-2017 Information security technology—General requirement of security for radio frequency identification systems (USD) via email in 1-3 business day VALID
GB/T 20988-2007 Information security technology—Disaster recovery specifications for information systems via email in 1-3 business day VALID please email coc@codeofchina.com for quotation
GB/T 32923-2016 Information technology—Security techniques—Governance of information security (USD) via email in 1-3 business day VALID
GB/T 32919-2016 Information security technology—Application guide to industrial control system security control (USD) via email in 1-10 business day VALID
GB/T 17902.2-2005 Information technology--Security techniques--Digital signatures with appendix--Part 2:Identity-based mechanisms via email in 1-3 business day VALID please email coc@codeofchina.com for quotation
GB/T 21028-2007 Information security technology—Security techniques requirement for server via email in 1-3 business day VALID please email coc@codeofchina.com for quotation
GB/T 28449-2018 Information security technology—Testing and evaluation process guide for classified protection of cybersecurity (USD) via email in 1-8 business day VALID
GB/T 36470-2018 Information security technology—Common security functional requirements for data acquisition and control field devices of industrial control systems (USD) via email in 1-5 business day VALID
GB/T 37939-2019 Information security technology—Security techniques requirement for network storage (USD) via email in 1 business day VALID
GB/T 38635.2-2020 Information security technology—Identity-based cryptographic algorithms SM9—Part 2:Algorithms (USD) via email in 1-5 business day TO BE VALID
GB/T 28456-2012 Testing specification for applications of IPsec protocol (USD) via email in 1-10 business day VALID
GB/T 38671-2020 Information security technology—Technical requirements for remote face recognition system (USD) via email in 1-5 business day TO BE VALID
GB/T 20261-2006 Information technology--Systems security engineering--Capability maturity model via email in 1-3 business day VALID please email coc@codeofchina.com for quotation
About Us | Contact Us | Terms of Service | Privacy | Cancellation & Refund Policy | Payment
Tel:+86-10-8572 5655 Fax:+86-10-8581 9515 Email: coc@codeofchina.com QQ: 672269886
Copyright:TransForyou Co., Ltd. 2008-2020