Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 28455-2012 |
Information security technology—Entity authentication involving a trusted third party and access architecture specification |
3420 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 18018-2007 |
Information security technology—Technical requirements for router security |
240 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/T 38541-2020 |
Information security technology—Guidance of cryptographic application for electronic records |
300 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 29240-2012 |
Information security technology—General security technique requirements and testing and evaluation method for terminal computer |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 15843.1-2017 |
Information technology—Security techniques—Entity authentication—Part 1:General |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 35282-2017 |
Information security technology—Security technology specifications of mobile e-government system |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36627-2018 |
Information security technology—Testing and evaluation technical guide for classified cybersecurity protection |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 18336.3-2015 |
Information technology—Security techniques—Evaluation criteria for IT security—Part 3:Security assurance components |
2460 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 28454-2012 |
Information technology—Security techniques—Selection,deployment and operations of intrusion detection systems |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 35275-2017 |
Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specification |
220 (USD) |
via email in
1 business day
|
VALID
|
|
JT/T 1275-2019 |
Security risk assessment guidance for transportation information system |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 17900-1999 |
Security technical requirements for proxy server |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 30277-2013 |
Information security technology—Public key infrastructures—Certification authentication institution identity code specification |
240 (USD) |
via email in
1-3 business day
|
|
|
GB/T 22081-2016 |
Information technology—Security techniques—Code of practice for information security controls |
1140 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 29241-2012 |
Information security technology—Public key infrastructure—PKI interoperability evaluation criteria |
1140 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 25070-2010 |
Information security technology—Technical requirements of security design for information system classified protection |
480 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB/T 36323-2018 |
Information security technology—Security management fundamental requirements for industrial control systems |
780 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 28448-2012 |
and evaluation requirement for classified protection of information system |
2040 (USD) |
via email in
1-10 business day
|
ABOLISHED
|
|
GB/T 34095-2017 |
Information security technology—Technology requirements for electronic payment of mobile terminal security based on short-range radio communication technology |
1440 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 28454-2020 |
Information technology—Security techniques—Selection,deployment and operation of intrusion detection and prevention systems(IDPS) |
720 (USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
|