“Information security ” 中國GB標準檢索結果 |
![]() |
1. 已翻譯的GB標準英文版(有 SALE
標誌的),以及GB標準中文版,可以直接在網站上購買,在收到您付款後,會在1~3天內發您郵箱。 2. 其他未翻譯的GB標準英文版,在接到您翻譯訂單後,才進行翻譯,時間一般需要多3~5天。 |
![]() |
GB/T 20274.1-2006 (中英文版) Information security technology Evaluation framework for information systems security assurance Part 1: Introduction and general model |
![]() |
|
![]() |
GB/T 20273-2006 (中英文版) Information security technology Security techniques requirement for database management system |
![]() |
|
![]() |
GB/T 20272-2006 (中英文版) Information security technology Security techniques requirement for operating system |
![]() |
|
![]() |
GB/T 20271-2006 (中英文版) Information security technology Common security techniques requirement for information system |
![]() |
|
![]() |
GB/T 20270-2006 (中英文版) Information security technology Basis security techniques requirement for network |
![]() |
|
![]() |
GB/T 20269-2006 (中英文版) Information security technology Information system security management requirements |
![]() |
|
![]() |
GB/T 20261-2006 (中英文版) Information technology - Systems security engineering - Capability maturity model |
![]() |
|
![]() |
GB/T 20011-2005 (中英文版) Information security technology -- Routers security evaluation criteria |
![]() |
|
![]() |
GB/T 20010-2005 (中英文版) Information security technology -- Packet filtering firewalls evaluation criteria |
![]() |
|
![]() |
GB/T 20009-2005 (中英文版) Information security technology -- Data base management systems security evaluation criteria |
![]() |
|
![]() |
GB/T 20008-2005 (中英文版) Information security technology -- Operating systems security evaluation criteria |
![]() |
|
![]() |
GB/T 19771-2005 (中英文版) Information technology-Security technology-Public key infrastructure-Minimum interoperability specification for PKI components |
![]() |
|
![]() |
GB/T 19715.2-2005 (中英文版) Information technology-Guidelines for the management of IT Security-Part 2:Managing and planning IT Security |
![]() |
|
![]() |
GB/T 19715.1-2005 (中英文版) Information technology-Guidelines for the management of IT Security-Part 1:Concepts and models of IT Security |
![]() |
|
![]() |
GB/T 19714-2005 (中英文版) Information technology-Security technology-Internet public key infrastructure-Certificate management protocol |
![]() |
|
![]() |
GB/T 19713-2005 (中英文版) Information technology-Security techniques-Public key in frastructure-Online certificate status protocol |
![]() |
|
![]() |
GB/T 17902.2-2005 (中英文版) Information technology-Security techniques-Digital signatures with appendix-Part2:Identity-based mechanisms |
![]() |
|
![]() |
GB/T 15843.5-2005 (中英文版) Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero knowledge techniques |
![]() |
|
![]() |
GB/T 18794.7-2003 (中英文版) Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 7:Security audit and alarms framework |
![]() |
|
![]() |
GB/T 18794.6-2003 (中英文版) Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 6:Integrity framework |
![]() |
|
![]() |
GB/T 18794.5-2003 (中英文版) Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 5:Confidentiality framework |
![]() |
|
![]() |
GB/T 18794.4-2003 (中英文版) Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 4:Non-repudiation framework |
![]() |
|
![]() |
GB/T 18794.3-2003 (中英文版) Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 3:Access control framework |
![]() |
|
![]() |
GB/T 18237.4-2003 (中英文版) Information technology--Open systems interconnection--Generic upper layers security--Part 4: Protecting transfer syntax specification |
![]() |
|
![]() |
GB/T 18794.2-2002 (中英文版) Informationtechnology--Open systems interconnection--Security frameworks for open systems--Part 2:Authentication framework |
![]() |
|
![]() |
GB/T 18794.1-2002 (中英文版) Information technology--Open systems interconnection--Security frameworks for open systems--Part 1:Overview |
![]() |
|
![]() |
GB/T 18238.3-2002 (中英文版) Information technology--Security techniques--Hash-functions--Part 3:Dedicated hash-functions |
![]() |
|
![]() |
GB/T 18238.2-2002 (中英文版) Information technology--Security techniques--Hash-functions--Part 2:Hash-functions using an n-bit block cipher |
![]() |
|
![]() |
GB/T 5271.8-2001 (中英文版) Information technology--Vocabulary--Part 8:Security |
![]() |
|
![]() |
GB/T 18238.1-2000 (中英文版) Information technology--Security techniques--Hash-function--Part 1:General |
![]() |
找到:553條目 | [首頁]-[上一頁]-[下一頁]-[尾頁] | 去到: [12] [13] [14] [15] [16] [17] [18] |