Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 38648-2020 |
Information security techniques—Guideline to bluetooth security |
300 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB/T 28458-2012 |
Information security technology—Vulnerability identification and description specification |
120 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 22080-2016 |
Information technology—Security techniques—Information security management systems—Requirements |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 30275-2013 |
Information security technology—Authentication and authorization—Authentication middleware framework and interface specification |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 33746.2-2017 |
Technical specification of NFC security—Part 2:Security mechanism requirements |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25068.2-2012 |
Information technology—Security techniques—IT network security—Part 2:Network security architecture |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25057-2010 |
Information security techniques—Public key infrastructure—Specification of application interface of electronic signature card |
660 (USD) |
via email in
1-5 business day
|
|
|
GB/T 30269.601-2016 |
|
720 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 36629.3-2018 |
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 3:Verification service message and processing rules |
360 (USD) |
via email in
1-3 business day
|
VALID
|
|
GA/T 1538-2018 |
Information security technology—Testing and evaluation criteria for enterprise mobile terminal security management products |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 25062-2010 |
Information security technology—Authentication and authorization—Role-based access control model and management specification |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 36957-2018 |
Information security technology—Requirements for disaster recovery service |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 29245-2012 |
Information security techniques—Basic requirements of information security for national department |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GM/T 0065-2019 |
Specification for capability construction of production and guarantee for commercial-cryptographic products |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 25064-2010 |
Information security technology—Public key infrastructure—Electronic signature formats specification |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 29243-2012 |
Information security technology—Specifications of delegated certification path construction and delegated validation for digital certificate |
600 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 21050-2019 |
Information security technology—Security requirements for network switch |
900 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 37933-2019 |
Information security technology—Technical requirements of industrial control system dedicated firewall |
490 (USD) |
via email in
1 business day
|
VALID
|
|
GB/T 37076-2018 |
Information security technology—Technical requirements for fingerprint recognition system |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 17902.3-2005 |
Information technology--Security techniques--Digital signatures with appendix--Part 3:Certificate-based mechanisms |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
|