Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 30273-2013 |
Information security technology—Common methodology for information systems security assurance evaluation |
2160 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 20269-2006 |
Information security technology Information system security management requirements |
975 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 38626-2020 |
Information security technology—Guide to password protection for intelligent connected device |
180 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 17901.1-2020 |
Information technology—Security techniques—Key management—Part 1:Framework |
420 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/Z 24294-2009 |
Information security technology—Guide of implementation for internet-based E-government information security |
540 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB 15852-1995 |
Information technology-Security techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GB/T 31497-2015 |
Information technology—Security techniques—Information security management—Measurement |
900 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 20987-2007 |
Information security technoloy—Evaluation criteria for online stock trading information systems security assurance |
|
via email in
1-3 business day
|
|
please email coc@codeofchina.com for quotation
|
GB/T 22186-2016 |
Information security techniques—Security technical requirements for IC card chip with CPU |
600 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 15843.3-1998 |
Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using asymmetric signature techniques |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GB/T 20270-2006 |
Information security technology--Basis security techniques requirement for network |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 31500-2015 |
Information security technology—Requirement of data recovery service for storage media |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 37941-2019 |
Information security technology—Security technical requirements of industrial control system network audit products |
430 (USD) |
via email in
1 business day
|
VALID
|
|
GB/T 35274-2017 |
Information security technology—Security capability requirements for big data services |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 26855-2011 |
Information security technology—Public key infrastructure—Certificate policy and certification practice statement framework |
600 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 30281-2013 |
Information security technology—Authentication and authorization—eXtensible Access Control Markup Language (XACML) |
1500 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 38625-2020 |
Information security technology—Security test requirements for cryptographic modules |
2280 (USD) |
via email in
1-10 business day
|
TO BE VALID
|
|
GB/Z 32916-2016 |
Information technology—Security techniques—Guidelines for auditors on information security controls |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 38647.2-2020 |
Information technology—Security techniques—Anonymous digital signatures—Part 2:Mechanisms using a group public key |
1620 (USD) |
via email in
1-10 business day
|
TO BE VALID
|
|
GB 15843.2-1997 |
Information technology—Security techniques—Entity authentication—Part 2: Mechanisms using symmetric encipherment algorithms |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
|