Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 30282-2013 |
Information security technology—Techniques requirements and testing and evaluation approaches for Anti-Spam product |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 31505-2015 |
Information security technology—Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall |
600 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 25069-2010 |
Information security technology—Glossary |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 22240-2008 |
Information security technology—Classification guide for classified protection of information systems security |
165 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 30285-2013 |
Information security technology—Construction and sustain management specifications of disaster recovery center |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 38561-2020 |
Information security technology—Technical requirements for cybersecurity management support system |
180 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 36958-2018 |
Information security technology—Technical requirements of security management center for classified protection of cybersecuriy |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 17902.1-1999 |
Information technology--Security techniques--Digital signature with appendix--Part 1:General |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 38628-2020 |
Information security technology—Cybersecurity guide for automotive electronics systems |
480 (USD) |
via email in
1-5 business day
|
TO BE VALID
|
|
GB/T 36651-2018 |
Information security techniques—Biometric authentication protocol framework based on trusted environment |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 37931-2019 |
Information security technology—Security technology requirements and testing and evaluation approaches for Web application security detection system |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 35276-2017 |
Information security technology—SM2 cryptography algorithm usage specification |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 17903.2-2008 |
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques |
255 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25061-2010 |
Information security technology—Public Key Infrastructure—XML digital signature syntax and processing specification |
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 38558-2020 |
|Information security technology—Security test method for office devices |
180 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 37094-2018 |
Information security technology—Security management requirements for office information systems |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 17903.3-2008 |
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques |
195 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25058-2010 |
Information security technology—Implementation guide for classified protection of information system |
540 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB/Z 32906-2016 |
Information security technology—Guide of construction for information security in small & medium E-commerce enterprises |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 36466-2018 |
Information security technology—Implementation guide to risk assessment of industrial control systems |
670 (USD) |
via email in
1 business day
|
VALID
|
|
|