“Information security ” 中國GB標準檢索結果 |
![]() |
1. 已翻譯的GB標準英文版(有 SALE
標誌的),以及GB標準中文版,可以直接在網站上購買,在收到您付款後,會在1~3天內發您郵箱。 2. 其他未翻譯的GB標準英文版,在接到您翻譯訂單後,才進行翻譯,時間一般需要多3~5天。 |
![]() |
GB/T 30282-2013 (中英文版) Information security technology—Techniques requirements and testing and evaluation approaches for Anti-Spam product |
![]() |
|
![]() |
GB/T 30281-2013 (中英文版) Information security technology—Authentication and authorization—eXtensible Access Control Markup Language (XACML) |
![]() |
|
![]() |
GB/T 30280-2013 (中英文版) Information security technology—Authentication and authorization—Geospatial eXtensible Access Control Markup Language (GeoXACML) |
![]() |
|
![]() |
GB/T 30279-2013 (中英文版) Information security technology—Vulnerability classification guide |
![]() |
|
![]() |
GB/T 30278-2013 (中英文版) Information security technology—Chinese government desktop core configuration specifications |
![]() |
|
![]() |
GB/T 30277-2013 (中英文版) Information security technology—Public key infrastructures―Certification authentication institution identity code specification |
![]() |
|
![]() |
GB/T 30276-2013 (中英文版) Information security technology—Vulnerability management criterion specification |
![]() |
|
![]() |
GB/T 30275-2013 (中英文版) Information security technology—Authentication and authorization—Authentication middleware framework and interface specification |
![]() |
|
![]() |
GB/T 30274-2013 (中英文版) Information security techniques—Public Key Infrastructure―Specification of testing on application interfaces of electronic signature card |
![]() |
|
![]() |
GB/T 30273-2013 (中英文版) Information security technology—Common methodology for information systems security assurance evaluation |
![]() |
|
![]() |
GB/T 30272-2013 (中英文版) Information security technology—Public Key Infrastructure—Testing and evaluation guide on standard conformance |
![]() |
|
![]() |
GB/T 30271-2013 (中英文版) Information security technology—Assessment criteria for information security service capability |
![]() |
|
![]() |
GB/T 30270-2013 (中英文版) Information technology—Security technology—Methodology for IT security evaluation |
![]() |
|
![]() |
GB/T 20945-2013 (中英文版) Information security technology—Technical requirements,testing and evaluation approaches for information system security audit product |
![]() |
|
![]() |
GB/T 20278-2013 (中英文版) Information security technology—Security technical requirements for network vulnerability scanners |
![]() |
|
![]() |
GB/T 20275-2013 (中英文版) Information security technology—Technical requirements and testing and evaluation approaches for network-based intrusion detection system |
![]() |
|
![]() |
GB/T 29841.3-2013 (中英文版) Satellite positioning personal position information service system(PPISS)- Part 3: Information security specification |
![]() |
|
![]() |
GB/Z 29830.3-2013 (中英文版) Information technology - Security technology - A framework for IT security assurance - Part 3: Analysis of assurance methods |
![]() |
|
![]() |
GB/Z 29830.2-2013 (中英文版) Information technology - Security technology - A framework for IT security assurance - Part 2: Assurance methods |
![]() |
|
![]() |
GB/Z 29830.1-2013 (中英文版) Information technology - Security technology - A framework for IT security assurance - Part 1: Overview and framework |
![]() |
|
![]() |
GB/T 29829-2013 (中英文版) Information security techniques - Functionality and interface specification of cryptographic support platform for trusted computing |
![]() |
|
![]() |
GB/T 29828-2013 (中英文版) Information security technology - Trusted computing specification - Trusted connect architecture |
![]() |
|
![]() |
GB/T 29827-2013 (中英文版) Information security technology - Trusted computing specification - Motherboard function and interface of trusted platform |
![]() |
|
![]() |
GB/T 30001.4-2013 (中英文版) Information technology - Mobile payment based on radio frequency - Part 4: Card application management and security |
![]() |
|
![]() |
GB/T 29767-2013 (中英文版) Information security techniques - Public key infrastructure - Bridge Certification Authority leveled certificate specification |
![]() |
|
![]() |
GB/T 29766-2013 (中英文版) Information security technology - Technical requirements and testing and evaluating approaches of website data recovery products |
![]() |
|
![]() |
GB/T 29765-2013 (中英文版) Information security technology - Technical requirements and testing and evaluating method for data backup and recovery products |
![]() |
|
![]() |
GB/Z 25320.5-2013 (中英文版) Power systems management and associated information exchange - Data and communications security - Part 5: Security for GB/T 18657 and derivatives |
![]() |
|
![]() |
GB/Z 25320.2-2013 (中英文版) Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
![]() |
|
![]() |
GB/T 29246-2012 (中英文版) Information technology - Security techniques - Information security management systems - Overview and vocabulary |
![]() |
找到:553條目 | [首頁]-[上一頁]-[下一頁]-[尾頁] | 去到: [8] [9] [10] [11] [12] [13] [14] |