“Information security ” 中國GB標準檢索結果 |
![]() |
1. 已翻譯的GB標準英文版(有 SALE
標誌的),以及GB標準中文版,可以直接在網站上購買,在收到您付款後,會在1~3天內發您郵箱。 2. 其他未翻譯的GB標準英文版,在接到您翻譯訂單後,才進行翻譯,時間一般需要多3~5天。 |
![]() |
GB/T 29245-2012 (中英文版) Information security techniques - Basic requirements of information security for national department |
![]() |
|
![]() |
GB/T 29244-2012 (中英文版) Information security technology - Basic security requirements for office devices |
![]() |
|
![]() |
GB/T 29243-2012 (中英文版) Information security technology - Specifications of delegated certification path construction and delegated validation for digital certificate |
![]() |
|
![]() |
GB/T 29242-2012 (中英文版) Information security technology - Authentication and authorization - Security assertion markup language |
![]() |
|
![]() |
GB/T 29241-2012 (中英文版) Information security technology - Public key infrastructure - PKI interoperability evaluation criteria |
![]() |
|
![]() |
GB/T 29240-2012 (中英文版) Information security technology - General security technique requirements and testing and evaluation method for terminal computer |
![]() |
|
![]() |
GB/T 29228-2012 (中英文版) Technical requirements for public telecommunication network equipments security - Calling party number information |
![]() |
|
![]() |
GB/T 29200-2012 (中英文版) Test method for public telecommunication network equipments security - Calling party number information |
![]() |
|
![]() |
GB/T 15852.2-2012 (中英文版) Information technology - Security techniques - Message Authentication Codes(MACs) - Part 2:Mechanisms using a dedicated hash-function |
![]() |
|
![]() |
GB/Z 28828-2012 (中英文版) Information security technology - Guideline for personal information protection within information system for public and commercial services |
![]() |
|
![]() |
GB/T 28458-2012 (中英文版) Information security technology - Vulnerability identification and description specification |
![]() |
|
![]() |
GB/T 28455-2012 (中英文版) Information security technology - Entity authentication involving a trusted third party and access architecture specification |
![]() |
|
![]() |
GB/T 28454-2012 (中英文版) Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems |
![]() |
|
![]() |
GB/T 28453-2012 (中英文版) Information security technology - Information system security management assessment requirements |
![]() |
|
![]() |
GB/T 28452-2012 (中英文版) Information security technology - Common security technique requirement for application software system |
![]() |
|
![]() |
GB/T 28451-2012 (中英文版) Information security technology - Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products |
![]() |
|
![]() |
GB/T 28450-2012 (中英文版) Information security technology - Guidelines for information security management system auditing |
![]() |
|
![]() |
GB/T 28449-2012 (中英文版) Information security technology - Testing and evaluation process guide for classified protection of information system security |
![]() |
|
![]() |
GB/T 28448-2012 (中英文版) Information security technology - Testing and evaluation requirement for classified protection of information system |
![]() |
|
![]() |
GB/T 28447-2012 (中英文版) Information security technology - Specification on the operation management of a certificate authority |
![]() |
|
![]() |
GB/T 25068.2-2012 (中英文版) Information technology - Security techniques - IT network security - Part 2: Network security architecture |
![]() |
|
![]() |
GB/T 25068.1-2012 (中英文版) Information technology - Security techniques - IT network security - Part 1: Network security management |
![]() |
|
![]() |
GB/T 28181-2011 (中英文版) Security and protection video monitoring network system technical specification for information transport, switch and control |
![]() |
|
![]() |
GB/Z 25320.6-2011 (中英文版) Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
![]() |
|
![]() |
GB/T 27910-2011 (中英文版) Financial services - Information security guidelines |
![]() |
|
![]() |
GB/T 26855-2011 (中英文版) Information security technology - Public key infrastructure - Certificate policy and certification practice statement framework |
![]() |
|
![]() |
GB/Z 25320.4-2010 (中英文版) Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
![]() |
|
![]() |
GB/Z 25320.3-2010 (中英文版) Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security -Profiles including TCP/IP |
![]() |
|
![]() |
GB/Z 25320.1-2010 (中英文版) Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security -Introduction to security issues |
![]() |
|
![]() |
GB/T 25070-2010 (中英文版) Information security technology - Technical requirements of security design for information system classified protection |
![]() |
找到:553條目 | [首頁]-[上一頁]-[下一頁]-[尾頁] | 去到: [9] [10] [11] [12] [13] [14] [15] |