China Security technology GB Standards Search Result |
![]() |
1. Ready translated GB standards ![]() 2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
![]() |
GB/T 35291-2017 Information Security technology—Cryptography token application interface specification - 英文版 |
![]() |
|
![]() |
GB/T 35282-2017 Information Security technology—Security technology specifications of mobile e-government system - 英文版 |
![]() |
|
![]() |
GB/T 35285-2017 Information Security technology—Public key infrastructure—Technical requirements for digital certificate based reliable electronic signature creation and verification - 英文版 |
![]() |
|
![]() |
GB/T 35287-2017 Information Security technology—Guidelines of trusted identity technology for website - 英文版 |
![]() |
|
![]() |
GB/T 35274-2017 Information Security technology—Security capability requirements for big data services - 英文版 |
![]() |
|
![]() |
GB/T 35273-2017 Information Security technology—Personal information security specification - 英文版 |
![]() |
|
![]() |
GB/T 18789.2-2016 Information technology—General specification for automated teller machine—Part 2:Security - 英文版 |
![]() |
|
![]() |
GB/T 33132-2016 Information Security technology—Guide of implementation for information security risk treatment - 英文版 |
![]() |
|
![]() |
GB/T 25067-2016 Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems - 英文版 |
![]() |
|
![]() |
GB/T 33131-2016 Information Security technology—Specification for IP storage network security based on IPSec - 英文版 |
![]() |
|
![]() |
GB/T 33134-2016 Information Security technology—Security requirement of public DNS service system - 英文版 |
![]() |
|
![]() |
GB/T 33133.1-2016 Information Security technology—ZUC stream cipher algorithm—Part 1: Algorithm description - 英文版 |
![]() |
|
![]() |
GB/T 32926-2016 Information Security technology—Information security management specification for government information technology service outsourcing - 英文版 |
![]() |
|
![]() |
GB/T 32922-2016 Information Security technology—Baseline and implementation guide of IPSec VPN securing access - 英文版 |
![]() |
|
![]() |
GB/T 32925-2016 Information Security technology—Basic security requirements for networked computer terminal of government - 英文版 |
![]() |
|
![]() |
GB/T 32927-2016 Information Security technology—Security architecture of mobile smart terminal - 英文版 |
![]() |
|
![]() |
GB/T 32918.2-2016 Information Security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 2: Digital signature algorithm - 英文版 |
![]() |
|
![]() |
GB/T 32920-2016 Information technology—Security techniques—Information security management for inter-sector and inter-organizational communications - 英文版 |
![]() |
|
![]() |
GB/T 32921-2016 Information Security technology—Security criterion on supplier conduct of information technology products - 英文版 |
![]() |
|
![]() |
GB/T 32918.3-2016 Information Security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 3: Key exchange protocol - 英文版 |
![]() |
|
![]() |
GB/T 32915-2016 Information Security technology—Randomness test methods for binary sequence - 英文版 |
![]() |
|
![]() |
GB/T 32924-2016 Information Security technology—Guideline for cyber security warning - 英文版 |
![]() |
|
![]() |
GB/T 32923-2016 Information technology—Security techniques—Governance of information security - 英文版 |
![]() |
|
![]() |
GB/T 32914-2016 Informayion Security technology—Information security service provider management requirements - 英文版 |
![]() |
|
![]() |
GB/T 22081-2016 Information Technology—Security Techniques—Code ofpractice for information security controls - 英文版 |
![]() |
|
![]() |
GB/Z 32916-2016 Information technology—Security techniques—Guidelines for auditors on information security controls - 英文版 |
![]() |
|
![]() |
GB/T 32918.4-2016 Information Security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 4: Public key encryption algorithm - 英文版 |
![]() |
|
![]() |
GB/T 32917-2016 Information Security technology—Security technique requirements and testing and evaluation approaches for WEB application firewall - 英文版 |
![]() |
|
![]() |
GB/Z 32906-2016 Information Security technology—Guide of construction for information security in small & medium E-commerce enterprises - 英文版 |
![]() |
|
![]() |
GB/T 32919-2016 Information Security technology—Application guide to industrial control system security control - 英文版 |
![]() |
Find out:501Items | To Page of: First -Previous-Next -Last | [5] [6] [7] [8] [9] [10] [11] |