code of china Chinese Classification Professional Classification ICS Classification Latest News

LoginRegister
Position: Standard Search VALID TO BE VALID SUPERSEDED TO BE SUPERSEDED ABOLISHED TO BE ABOLISHED
Standard No. Title Price(USD) Delivery Status Add To Cart
GB/T 30282-2013 Information security technology—Techniques requirements and testing and evaluation approaches for Anti-Spam product 360 (USD) via email in 1-3 business day VALID
GB/T 31505-2015 Information security technology—Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall 600 (USD) via email in 1-5 business day VALID
GB/T 25069-2010 Information security technology—Glossary via email in VALID please email coc@codeofchina.com for quotation
GB/T 22240-2008 Information security technology—Classification guide for classified protection of information systems security 165 (USD) via email in 1-3 business day VALID
GB/T 30285-2013 Information security technology—Construction and sustain management specifications of disaster recovery center 420 (USD) via email in 1-3 business day VALID
GB/T 38561-2020 Information security technology—Technical requirements for cybersecurity management support system 180 (USD) via email in 1-3 business day TO BE VALID
GB/T 36958-2018 Information security technology—Technical requirements of security management center for classified protection of cybersecuriy 480 (USD) via email in 1-5 business day VALID
GB/T 17902.1-1999 Information technology--Security techniques--Digital signature with appendix--Part 1:General via email in 1-3 business day VALID please email coc@codeofchina.com for quotation
GB/T 38628-2020 Information security technology—Cybersecurity guide for automotive electronics systems 480 (USD) via email in 1-5 business day TO BE VALID
GB/T 36651-2018 Information security techniques—Biometric authentication protocol framework based on trusted environment 420 (USD) via email in 1-3 business day VALID
GB/T 37931-2019 Information security technology—Security technology requirements and testing and evaluation approaches for Web application security detection system 720 (USD) via email in 1-5 business day VALID
GB/T 35276-2017 Information security technology—SM2 cryptography algorithm usage specification 180 (USD) via email in 1-3 business day VALID
GB/T 17903.2-2008 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques 255 (USD) via email in 1-3 business day VALID
GB/T 25061-2010 Information security technology—Public Key Infrastructure—XML digital signature syntax and processing specification 720 (USD) via email in 1-5 business day VALID
GB/T 38558-2020 |Information security technology—Security test method for office devices 180 (USD) via email in 1-3 business day TO BE VALID
GB/T 37094-2018 Information security technology—Security management requirements for office information systems 180 (USD) via email in 1-3 business day VALID
GB/T 17903.3-2008 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques 195 (USD) via email in 1-3 business day VALID
GB/T 25058-2010 Information security technology—Implementation guide for classified protection of information system 540 (USD) via email in 1-5 business day ABOLISHED
GB/Z 32906-2016 Information security technology—Guide of construction for information security in small & medium E-commerce enterprises 540 (USD) via email in 1-5 business day VALID
GB/T 36466-2018 Information security technology—Implementation guide to risk assessment of industrial control systems 670 (USD) via email in 1 business day VALID
About Us | Contact Us | Terms of Service | Privacy | Cancellation & Refund Policy | Payment
Tel:+86-10-8572 5655 Fax:+86-10-8581 9515 Email: coc@codeofchina.com QQ: 672269886
Copyright:TransForyou Co., Ltd. 2008-2020