China Information security GB Standards Search Result |
![]() |
1. Ready translated GB standards ![]() 2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
![]() |
GB/T 25069-2010 Information security technology glossary - 英文版 |
![]() |
|
![]() |
GB/T 25068.5-2010 Information technology - Security techniques - IT network security - Part 5: Securing communications across networks using virtual private networks - 英文版 |
![]() |
|
![]() |
GB/T 25068.4-2010 Information technology - Security techniques - IT network security - Part 4: Securing remote access - 英文版 |
![]() |
|
![]() |
GB/T 25068.3-2010 Information technology - Security techniques - IT network security - Part 3: Securing communications between networks using security gateways - 英文版 |
![]() |
|
![]() |
GB/T 25067-2010 Information technology - Security techniques - Requirements for bodies providing audit and certification of Information security management systems - 英文版 |
![]() |
|
![]() |
GB/T 25066-2010 Information security technology - Type and code of information security product - 英文版 |
![]() |
|
![]() |
GB/T 25065-2010 Information security technology - Public key infrastructure - Security requirements for signature creation applications - 英文版 |
![]() |
|
![]() |
GB/T 25064-2010 Information security technology - Public key infrastructure - Electronic signature formats specification - 英文版 |
![]() |
|
![]() |
GB/T 25063-2010 Information security technology - Testing and evaluation requirement for server security - 英文版 |
![]() |
|
![]() |
GB/T 25062-2010 Information security technology - Authentication and authorization - Role-based access control model and management specification - 英文版 |
![]() |
|
![]() |
GB/T 25061-2010 Information security technology - Public key infrastructure - XML digital signature syntax and processing specification - 英文版 |
![]() |
|
![]() |
GB/T 25060-2010 Information security techniques - Public key infrastructure - Interface specification of X.509 digital certificates application - 英文版 |
![]() |
|
![]() |
GB/T 25059-2010 Information security technology - Public key infrastructure - Simple online certificate status protocol - 英文版 |
![]() |
|
![]() |
GB/T 25058-2010 Information security technology - Implementation guide for classified protection of information system - 英文版 |
![]() |
|
![]() |
GB/T 25057-2010 Information security techniques - Public key infrastructure - Specification of application interface of electronic signature card - 英文版 |
![]() |
|
![]() |
GB/T 25056-2010 Information security techniques - Specifications of cryptograph and related security technology for certificate authentication system - 英文版 |
![]() |
|
![]() |
GB/T 25055-2010 Information security techniques - Public key infrastructure security supporting platform framework - 英文版 |
![]() |
|
![]() |
GB/Z 24364-2009 Information security technology - Guidelines for information security risk management - 英文版 |
![]() |
|
![]() |
GB/T 24363-2009 Information security technology - Specifications of emergency response plan for information security - 英文版 |
![]() |
|
![]() |
GB/Z 24294-2009 Information security technology - Guide of implementation for internet-based E-government information security - 英文版 |
![]() |
|
![]() |
GB/T 20274.4-2008 Information security technology Evaluation framework for information systems security assurance Part 4: Engineering assurance - 英文版 |
![]() |
|
![]() |
GB/T 20274.3-2008 Information security technology Evaluation framework for information systems security assurance Part 3: Management assurance - 英文版 |
![]() |
|
![]() |
GB/T 20274.2-2008 Information security technology - Evaluation framework for information systems security assurance Part 2: Technical assurance - 英文版 |
![]() |
|
![]() |
GB/T 22186-2008 Information security techniques Security technical requirements for IC card chip with CPU(EAL4+) - 英文版 |
![]() |
|
![]() |
GB/T 17710-2008 Information technology-Security technique - Check character systems - 英文版 |
![]() |
|
![]() |
GB/T 17903.3-2008 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques - 英文版 |
![]() |
|
![]() |
GB/T 15852.1-2008 Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher - 英文版 |
![]() |
|
![]() |
GB/T 16722.1-2008 Technical product documentation - Handling of computer-based technical information - Security requirements - 英文版 |
![]() |
|
![]() |
GB/T 17964-2008 Information technology - Security Techniques - Modes of operation for a block cipher - 英文版 |
![]() |
|
![]() |
GB/T 17903.2-2008 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques - 英文版 |
![]() |
Find out:553Items | To Page of: First -Previous-Next -Last | [10] [11] [12] [13] [14] [15] [16] |