China Information security GB Standards Search Result |
1. Ready translated GB standards and Chinese version GB Standards, you can purchase directly in the web page; After receive your payment, we will send the GB Standards PDF file to your Email within
1~3 days.
2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
GB/T 31497-2015 Information technology—Security techniques—Information security management—Measurement - 英文版 |
|||
GB/T 31496-2015 Information technology—Security techniques—Information security management system implementation guidance - 英文版 |
|||
GB/T 31495.3-2015 Information security technology—Indicator system of information security assurance and evaluation methods—Part 3: Implementation guide - 英文版 |
|||
GB/T 31495.2-2015 Information security technology—Indicator system of information security assurance and evaluation methods—Part 2: Indicator system - 英文版 |
|||
GB/T 31495.1-2015 Information security technology—Indicator system of information security assurance and evaluation methods—Part 1: Concepts and model - 英文版 |
|||
GB/T 20281-2015 Information security technology—Security technical requirements and testing and evaluation approaches for firewall - 英文版 |
|||
GB/T 20279-2015 Information security technology—Security technical requirements of network and terminal separation products - 英文版 |
|||
GB/T 20277-2015 Information security technology—Testing and evaluation approaches of network and terminal separation products - 英文版 |
|||
GB/T 18336.3-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 3: Security assurance components - 英文版 |
|||
GB/T 18336.2-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 2: Security functional components - 英文版 |
|||
GB/T 18336.1-2015 Information technology—Security techniques—Evaluation criteria for IT security—Part 1: Introduction and general model - 英文版 |
|||
GB/Z 25320.7-2015 Power systems management and associated information exchange—Data and communications security—Part 7: Network and system management (NSM) data object models - 英文版 |
|||
GB/T 31168-2014 Information security technology―Security capability requirements of cloud computing services - 英文版 |
|||
GB/T 31167-2014 Information security technology―Security guide of cloud computing services - 英文版 |
|||
GB/Z 30286-2013 Information security technology—Guide for the production of information system protect profile and information system security target - 英文版 |
|||
GB/T 30290.3-2013 Satellite positioning vehicle information service system(VISS)—Part 3: Information security specification - 英文版 |
|||
GB/T 30287.3-2013 Satellite positioning ship information service system(SISS)―Part 3: Information security specification - 英文版 |
|||
GB/T 30285-2013 Information security technology—Construction and sustain management specifications of disaster recovery center - 英文版 |
|||
GB/T 30283-2013 Information security technology—Information security service— Category - 英文版 |
|||
GB/T 30282-2013 Information security technology—Techniques requirements and testing and evaluation approaches for Anti-Spam product - 英文版 |
|||
GB/T 30281-2013 Information security technology—Authentication and authorization—eXtensible Access Control Markup Language (XACML) - 英文版 |
|||
GB/T 30280-2013 Information security technology—Authentication and authorization—Geospatial eXtensible Access Control Markup Language (GeoXACML) - 英文版 |
|||
GB/T 30279-2013 Information security technology—Vulnerability classification guide - 英文版 |
|||
GB/T 30278-2013 Information security technology—Chinese government desktop core configuration specifications - 英文版 |
|||
GB/T 30277-2013 Information security technology—Public key infrastructures―Certification authentication institution identity code specification - 英文版 |
|||
GB/T 30276-2013 Information security technology—Vulnerability management criterion specification - 英文版 |
|||
GB/T 30275-2013 Information security technology—Authentication and authorization—Authentication middleware framework and interface specification - 英文版 |
|||
GB/T 30274-2013 Information security techniques—Public Key Infrastructure―Specification of testing on application interfaces of electronic signature card - 英文版 |
|||
GB/T 30273-2013 Information security technology—Common methodology for information systems security assurance evaluation - 英文版 |
|||
GB/T 30272-2013 Information security technology—Public Key Infrastructure—Testing and evaluation guide on standard conformance - 英文版 |
Find out:542Items | To Page of: First -Previous-Next -Last | [7] [8] [9] [10] [11] [12] [13] |