Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 15843.2-2008 |
Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm |
195 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/T 20277-2006 |
Information security technology Testing and evaluation techniques of separation components of network and terminal equipment |
1170 (USD) |
via email in
1-8 business day
|
ABOLISHED
|
|
GB/T 18336.1-2015 |
Information technology—Security techniques—Evaluation criteria for IT security—Part 1:Introduction and general model |
900 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 35278-2017 |
Information security technology—Technical requirements for mobile terminal security protection |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 15843.4-2008 |
Information technology - Security techniques - Entity authentication - Part 4:Mechanisms using a cryptographic check function |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25060-2010 |
Information security techniques—Public Key Infrastructure—Interface specification of X.509 digital certificates application |
420 (USD) |
via email in
1-3 business day
|
|
|
GB/T 25067-2010 |
Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems |
540 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB/T 35290-2017 |
Information security technology—General requirement of security for radio frequency identification systems |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 20988-2007 |
Information security technology—Disaster recovery specifications for information systems |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 32923-2016 |
Information technology—Security techniques—Governance of information security |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 32919-2016 |
Information security technology—Application guide to industrial control system security control |
1740 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 17902.2-2005 |
Information technology--Security techniques--Digital signatures with appendix--Part 2:Identity-based mechanisms |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 21028-2007 |
Information security technology—Security techniques requirement for server |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 28449-2018 |
Information security technology—Testing and evaluation process guide for classified protection of cybersecurity |
900 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 36470-2018 |
Information security technology—Common security functional requirements for data acquisition and control field devices of industrial control systems |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 37939-2019 |
Information security technology—Security techniques requirement for network storage |
490 (USD) |
via email in
1 business day
|
VALID
|
|
GB/T 38635.2-2020 |
Information security technology—Identity-based cryptographic algorithms SM9—Part 2:Algorithms |
660 (USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
GB/T 28456-2012 |
Testing specification for applications of IPsec protocol |
1380 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 38671-2020 |
Information security technology—Technical requirements for remote face recognition system |
480 (USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
GB/T 20261-2006 |
Information technology--Systems security engineering--Capability maturity model |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
|