Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 22080-2008 |
Information technology—Security techniques—Information security management systems—Requirments |
420 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/Z 29830.2-2013 |
Information technology—Security technology—A framework for IT security assurance—Part 2:Assurance methods |
780 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 36624-2018 |
Information technology—Security techniques—Authenticated encryption |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GM/T 0067-2019 |
Interface specifications of authentication based on digital certificate |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 22239-2019 |
Information security technology—Baseline for classified protection of cybersecurity |
1380 (USD) |
via email in
1-10 business day
|
VALID
|
|
GB/T 28449-2012 |
Information security technology—Testing and evaluation process guide for classified protection of information system security |
1200 (USD) |
via email in
1-8 business day
|
ABOLISHED
|
|
GM/T 0069-2019 |
Open identity authentication framework |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 25068.1-2012 |
Information technology—Security techniques—IT network security—Part 1:Network security management |
840 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 37033.2-2018 |
Information security technology—Technical requirements for cryptographic application for radio frequency identification systems—Part 2:Technical requirements for cryptographic application for RF tag,reader and communication |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 20281-2020 |
Information security technology—Security technical requirements and testing assessment approaches for firewall |
900 (USD) |
via email in
1-8 business day
|
TO BE VALID
|
|
GB/T 21054-2007 |
Information security techniques—Public key infrastructure—Evaluation criteria for security classification protection of PKI system |
435 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 22240-2020 |
Information security technology—Classification guide for classified protection of cybersecurity |
240 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GA/T 1390.2-2017 |
Information security technology—General requirements for classified protection of cyber security—Part 2:Special security requirements for cloud computing |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 37950-2019 |
Information security technology—Security technical requirements for desktop cloud |
310 (USD) |
via email in
1 business day
|
VALID
|
|
GB/T 37027-2018 |
Information security technology—Specifications of definition and description for network attack |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 30274-2013 |
Information security techniques—Public Key Infrastructure—Specification of testing on application interfaces of electronic signature card |
240 (USD) |
via email in
1-3 business day
|
|
|
GM/T 0075-2019 |
Cryptography technical requirements for credit banking information systems |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 20274.3-2008 |
Information security technology Evaluation framework for information systems security assurance Part 3: Management assurance |
960 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 32927-2016 |
Information security technology—Security architecture of mobile smart terminal |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 18238.2-2002 |
Information technology--Security techniques--Hash-functions--Part 2:Hash-functions using an n-bit block cipher |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
|