code of china Chinese Classification Professional Classification ICS Classification Latest News

LoginRegister
Position: Standard Search VALID TO BE VALID SUPERSEDED TO BE SUPERSEDED ABOLISHED TO BE ABOLISHED
Standard No. Title Price(USD) Delivery Status Add To Cart
GB/T 38648-2020 Information security techniques—Guideline to bluetooth security (USD) via email in 1-3 business day TO BE VALID
GB/T 28458-2012 Information security technology—Vulnerability identification and description specification (USD) via email in 1-3 business day VALID
GB/T 22080-2016 Information technology—Security techniques—Information security management systems—Requirements (USD) via email in 1-3 business day VALID
GB/T 30275-2013 Information security technology—Authentication and authorization—Authentication middleware framework and interface specification (USD) via email in 1-3 business day VALID
GB/T 33746.2-2017 Technical specification of NFC security—Part 2:Security mechanism requirements (USD) via email in 1-3 business day VALID
GB/T 25068.2-2012 Information technology—Security techniques—IT network security—Part 2:Network security architecture (USD) via email in 1-3 business day VALID
GB/T 25057-2010 Information security techniques—Public key infrastructure—Specification of application interface of electronic signature card (USD) via email in 1-5 business day
GB/T 30269.601-2016 (USD) via email in 1-5 business day VALID
GB/T 36629.3-2018 Information security technology—Security technique requirements for citizen cyber electronic identity—Part 3:Verification service message and processing rules (USD) via email in 1-3 business day VALID
GA/T 1538-2018 Information security technology—Testing and evaluation criteria for enterprise mobile terminal security management products (USD) via email in 1-3 business day VALID
GB/T 25062-2010 Information security technology—Authentication and authorization—Role-based access control model and management specification (USD) via email in 1-5 business day VALID
GB/T 36957-2018 Information security technology—Requirements for disaster recovery service (USD) via email in 1-3 business day VALID
GB/T 29245-2012 Information security techniques—Basic requirements of information security for national department (USD) via email in 1-3 business day VALID
GM/T 0065-2019 Specification for capability construction of production and guarantee for commercial-cryptographic products via email in VALID please email coc@codeofchina.com for quotation
GB/T 25064-2010 Information security technology—Public key infrastructure—Electronic signature formats specification (USD) via email in 1-5 business day VALID
GB/T 29243-2012 Information security technology—Specifications of delegated certification path construction and delegated validation for digital certificate (USD) via email in 1-5 business day VALID
GB/T 21050-2019 Information security technology—Security requirements for network switch (USD) via email in 1-8 business day VALID
GB/T 37933-2019 Information security technology—Technical requirements of industrial control system dedicated firewall (USD) via email in 1 business day VALID
GB/T 37076-2018 Information security technology—Technical requirements for fingerprint recognition system (USD) via email in 1-5 business day VALID
GB/T 17902.3-2005 Information technology--Security techniques--Digital signatures with appendix--Part 3:Certificate-based mechanisms via email in 1-3 business day VALID please email coc@codeofchina.com for quotation
About Us | Contact Us | Terms of Service | Privacy | Cancellation & Refund Policy | Payment
Tel:+86-10-8572 5655 Fax:+86-10-8581 9515 Email: coc@codeofchina.com QQ: 672269886
Copyright:TransForyou Co., Ltd. 2008-2020