China Information security GB Standards Search Result |
1. Ready translated GB standards and Chinese version GB Standards, you can purchase directly in the web page; After receive your payment, we will send the GB Standards PDF file to your Email within
1~3 days.
2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
GB/T 29245-2012 Information security techniques - Basic requirements of information security for national department - 英文版 |
|||
GB/T 29244-2012 Information security technology - Basic security requirements for office devices - 英文版 |
|||
GB/T 29243-2012 Information security technology - Specifications of delegated certification path construction and delegated validation for digital certificate - 英文版 |
|||
GB/T 29242-2012 Information security technology - Authentication and authorization - Security assertion markup language - 英文版 |
|||
GB/T 29241-2012 Information security technology - Public key infrastructure - PKI interoperability evaluation criteria - 英文版 |
|||
GB/T 29240-2012 Information security technology - General security technique requirements and testing and evaluation method for terminal computer - 英文版 |
|||
GB/T 29228-2012 Technical requirements for public telecommunication network equipments security - Calling party number information - 英文版 |
|||
GB/T 29200-2012 Test method for public telecommunication network equipments security - Calling party number information - 英文版 |
|||
GB/T 15852.2-2012 Information technology - Security techniques - Message Authentication Codes(MACs) - Part 2:Mechanisms using a dedicated hash-function - 英文版 |
|||
GB/Z 28828-2012 Information security technology - Guideline for personal information protection within information system for public and commercial services - 英文版 |
|||
GB/T 28458-2012 Information security technology - Vulnerability identification and description specification - 英文版 |
|||
GB/T 28455-2012 Information security technology - Entity authentication involving a trusted third party and access architecture specification - 英文版 |
|||
GB/T 28454-2012 Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems - 英文版 |
|||
GB/T 28453-2012 Information security technology - Information system security management assessment requirements - 英文版 |
|||
GB/T 28452-2012 Information security technology - Common security technique requirement for application software system - 英文版 |
|||
GB/T 28451-2012 Information security technology - Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products - 英文版 |
|||
GB/T 28450-2012 Information security technology - Guidelines for information security management system auditing - 英文版 |
|||
GB/T 28449-2012 Information security technology - Testing and evaluation process guide for classified protection of information system security - 英文版 |
|||
GB/T 28448-2012 Information security technology - Testing and evaluation requirement for classified protection of information system - 英文版 |
|||
GB/T 28447-2012 Information security technology - Specification on the operation management of a certificate authority - 英文版 |
|||
GB/T 25068.2-2012 Information technology - Security techniques - IT network security - Part 2: Network security architecture - 英文版 |
|||
GB/T 25068.1-2012 Information technology - Security techniques - IT network security - Part 1: Network security management - 英文版 |
|||
GB/T 28181-2011 Security and protection video monitoring network system technical specification for information transport, switch and control - 英文版 |
|||
GB/Z 25320.6-2011 Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 - 英文版 |
|||
GB/T 27910-2011 Financial services - Information security guidelines - 英文版 |
|||
GB/T 26855-2011 Information security technology - Public key infrastructure - Certificate policy and certification practice statement framework - 英文版 |
|||
GB/Z 25320.4-2010 Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS - 英文版 |
|||
GB/Z 25320.3-2010 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security -Profiles including TCP/IP - 英文版 |
|||
GB/Z 25320.1-2010 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security -Introduction to security issues - 英文版 |
|||
GB/T 25070-2010 Information security technology - Technical requirements of security design for information system classified protection - 英文版 |
Find out:553Items | To Page of: First -Previous-Next -Last | [9] [10] [11] [12] [13] [14] [15] |