“Information security ” 中國GB標準檢索結果 |
![]() |
1. 已翻譯的GB標準英文版(有 SALE
標誌的),以及GB標準中文版,可以直接在網站上購買,在收到您付款後,會在1~3天內發您郵箱。 2. 其他未翻譯的GB標準英文版,在接到您翻譯訂單後,才進行翻譯,時間一般需要多3~5天。 |
![]() |
GB/T 25069-2010 (中英文版) Information security technology glossary |
![]() |
|
![]() |
GB/T 25068.5-2010 (中英文版) Information technology - Security techniques - IT network security - Part 5: Securing communications across networks using virtual private networks |
![]() |
|
![]() |
GB/T 25068.4-2010 (中英文版) Information technology - Security techniques - IT network security - Part 4: Securing remote access |
![]() |
|
![]() |
GB/T 25068.3-2010 (中英文版) Information technology - Security techniques - IT network security - Part 3: Securing communications between networks using security gateways |
![]() |
|
![]() |
GB/T 25067-2010 (中英文版) Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems |
![]() |
|
![]() |
GB/T 25066-2010 (中英文版) Information security technology - Type and code of information security product |
![]() |
|
![]() |
GB/T 25065-2010 (中英文版) Information security technology - Public key infrastructure - Security requirements for signature creation applications |
![]() |
|
![]() |
GB/T 25064-2010 (中英文版) Information security technology - Public key infrastructure - Electronic signature formats specification |
![]() |
|
![]() |
GB/T 25063-2010 (中英文版) Information security technology - Testing and evaluation requirement for server security |
![]() |
|
![]() |
GB/T 25062-2010 (中英文版) Information security technology - Authentication and authorization - Role-based access control model and management specification |
![]() |
|
![]() |
GB/T 25061-2010 (中英文版) Information security technology - Public key infrastructure - XML digital signature syntax and processing specification |
![]() |
|
![]() |
GB/T 25060-2010 (中英文版) Information security techniques - Public key infrastructure - Interface specification of X.509 digital certificates application |
![]() |
|
![]() |
GB/T 25059-2010 (中英文版) Information security technology - Public key infrastructure - Simple online certificate status protocol |
![]() |
|
![]() |
GB/T 25058-2010 (中英文版) Information security technology - Implementation guide for classified protection of information system |
![]() |
|
![]() |
GB/T 25057-2010 (中英文版) Information security techniques - Public key infrastructure - Specification of application interface of electronic signature card |
![]() |
|
![]() |
GB/T 25056-2010 (中英文版) Information security techniques - Specifications of cryptograph and related security technology for certificate authentication system |
![]() |
|
![]() |
GB/T 25055-2010 (中英文版) Information security techniques - Public key infrastructure security supporting platform framework |
![]() |
|
![]() |
GB/Z 24364-2009 (中英文版) Information security technology - Guidelines for information security risk management |
![]() |
|
![]() |
GB/T 24363-2009 (中英文版) Information security technology - Specifications of emergency response plan for information security |
![]() |
|
![]() |
GB/Z 24294-2009 (中英文版) Information security technology - Guide of implementation for internet-based E-government information security |
![]() |
|
![]() |
GB/T 20274.4-2008 (中英文版) Information security technology Evaluation framework for information systems security assurance Part 4: Engineering assurance |
![]() |
|
![]() |
GB/T 20274.3-2008 (中英文版) Information security technology Evaluation framework for information systems security assurance Part 3: Management assurance |
![]() |
|
![]() |
GB/T 20274.2-2008 (中英文版) Information security technology - Evaluation framework for information systems security assurance Part 2: Technical assurance |
![]() |
|
![]() |
GB/T 22186-2008 (中英文版) Information Security techniques Security technical requirements for IC card chip with CPU(EAL4+) |
![]() |
|
![]() |
GB/T 17710-2008 (中英文版) Information technology-Security technique - Check character systems |
![]() |
|
![]() |
GB/T 17903.3-2008 (中英文版) Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques |
![]() |
|
![]() |
GB/T 15852.1-2008 (中英文版) Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher |
![]() |
|
![]() |
GB/T 16722.1-2008 (中英文版) Technical product documentation - Handling of computer-based technical information - Security requirements |
![]() |
|
![]() |
GB/T 17964-2008 (中英文版) Information technology - Security Techniques - Modes of operation for a block cipher |
![]() |
|
![]() |
GB/T 17903.2-2008 (中英文版) Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques |
![]() |
找到:553條目 | [首頁]-[上一頁]-[下一頁]-[尾頁] | 去到: [10] [11] [12] [13] [14] [15] [16] |