China Information security GB Standards Search Result |
![]() |
1. Ready translated GB standards ![]() 2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
![]() |
GB/T 32926-2016 Information security technology—Information security management specification for government information technology service outsourcing - 英文版 |
![]() |
|
![]() |
GB/T 20276-2016 Information security techniques—Security technical requirements for IC card chip with CPU - 英文版 |
![]() |
|
![]() |
GB/T 32922-2016 Information security technology—Baseline and implementation guide of IPSec VPN securing access - 英文版 |
![]() |
|
![]() |
GB/T 32925-2016 Information security technology—Basic security requirements for networked computer terminal of government - 英文版 |
![]() |
|
![]() |
GB/T 32927-2016 Information security technology—Security architecture of mobile smart terminal - 英文版 |
![]() |
|
![]() |
GB/T 32918.2-2016 Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 2: Digital signature algorithm - 英文版 |
![]() |
|
![]() |
GB/T 32920-2016 Information technology—Security techniques—Information security management for inter-sector and inter-organizational communications - 英文版 |
![]() |
|
![]() |
GB/T 32921-2016 Information security technology—Security criterion on supplier conduct of information technology products - 英文版 |
![]() |
|
![]() |
GB/T 32918.3-2016 Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 3: Key exchange protocol - 英文版 |
![]() |
|
![]() |
GB/T 32915-2016 Information security technology—Randomness test methods for binary sequence - 英文版 |
![]() |
|
![]() |
GB/T 32924-2016 Information security technology—Guideline for cyber security warning - 英文版 |
![]() |
|
![]() |
GB/T 22080-2016 Information technolog—Securitytechniques—Information security management systems—Requirements - 英文版 |
![]() |
|
![]() |
GB/T 32923-2016 Information technology—Security techniques—Governance of Information security - 英文版 |
![]() |
|
![]() |
GB/T 32914-2016 Informayion security technology—Information security service provider management requirements - 英文版 |
![]() |
|
![]() |
GB/T 22081-2016 Information Technology—Security Techniques—Code ofpractice for Information security controls - 英文版 |
![]() |
|
![]() |
GB/Z 32916-2016 Information technology—Security techniques—Guidelines for auditors on Information security controls - 英文版 |
![]() |
|
![]() |
GB/T 32918.4-2016 Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 4: Public key encryption algorithm - 英文版 |
![]() |
|
![]() |
GB/T 32917-2016 Information security technology—Security technique requirements and testing and evaluation approaches for WEB application firewall - 英文版 |
![]() |
|
![]() |
GB/Z 32906-2016 Information security technology—Guide of construction for information security in small & medium E-commerce enterprises - 英文版 |
![]() |
|
![]() |
GB/T 32919-2016 Information security technology—Application guide to industrial control system security control - 英文版 |
![]() |
|
![]() |
GB/T 32918.1-2016 Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 1: General - 英文版 |
![]() |
|
![]() |
GB/T 32907-2016 Information security technology—SM4 block cipher algorthm - 英文版 |
![]() |
|
![]() |
GB/T 22186-2016 Information security techniques—Security technical requirements for IC card chip with CPU - 英文版 |
![]() |
|
![]() |
GB/T 32905-2016 Information security techniques—SM3 crytographic hash algorithm - 英文版 |
![]() |
|
![]() |
GB/T 28181-2016 Technical requirements for information transport, switch and control in video surveillance network system for public security - 英文版 |
![]() |
|
![]() |
GB/T 15843.3-2016 Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques - 英文版 |
![]() |
|
![]() |
GB/T 30269.601-2016 Information technology—Sensor network—Part 601: Information security general technical specifications - 英文版 |
![]() |
|
![]() |
GB/T 32351-2015 Information security level evaluation indicators for electric power industry - 英文版 |
![]() |
|
![]() |
GB/T 32213-2015 Information security technology—Public key infrastructure—Specifications for remote password authentication and key establishment - 英文版 |
![]() |
|
![]() |
GB/T 31722-2015 Information technology—Security techniques—Information security risk management - 英文版 |
![]() |
Find out:553Items | To Page of: First -Previous-Next -Last | [6] [7] [8] [9] [10] [11] [12] |