Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 20279-2006 |
Information security technology Security techniques requirements of separation components of network and terminal equipment |
615 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB/Z 20985-2007 |
Information technology—Security techniques—Information security incident management guide |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GB/T 18238.3-2002 |
Information technology--Security techniques--Hash-functions--Part 3:Dedicated hash-functions |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 19715.2-2005 |
Information technology--Guidelines for the management of IT Security--Part 2:Managing and planning IT security |
|
via email in
1-3 business day
|
|
please email coc@codeofchina.com for quotation
|
GB/T 37044-2018 |
Information security technology—Security reference model and generic requirements for internet of things |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 19716-2005 |
Information technology-Code of practice for information security management |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GB/T 33565-2017 |
Information security technology—Security technology requirements for wireless local area network(wlan) access system(EAL2+) |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 36322-2018 |
Information security technology—Cryptographic device application interface specifications |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 21050-2007 |
Information security techniques—Security requirements for network switch(EAL3) |
885 (USD) |
via email in
1-8 business day
|
ABOLISHED
|
|
GB/T 29828-2013 |
Information security technology—Trusted computing specification—Trusted connect architecture |
2220 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 35280-2017 |
Information security technology—Requirement and code of conduct for security testing bodies of information technology products |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 18336.1-2008 |
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model |
600 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB/T 18018-2019 |
Information security technology—Technical requirement for router security |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 20274.1-2006 |
Information security technology Evaluation framework for information systems security assurance Part 1: Introduction and general model |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 34953.2-2018 |
Information technology—Security techniques—Anonymous entity authentication—Part 2:Mechanisms based on signatures using a group public key |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 30279-2013 |
Information security technology—Vulnerability classification guide |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
LD/T 30.5-2009 |
Human resources and social security electronic authentication system—Part 5:Specification of digital certificate storage medium |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 32917-2016 |
Information security technology—Security technique requirements and testing and evaluation approachesfor WEB application firewall |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 15843.2-2017 |
Information technology—Security techniques—Entity authentication—Part 2:Mechanisms using symmetric encipherment algorithms |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 20979-2007 |
Information security technolgy—Technical requirments for iris recognition system |
405 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
|