China Information security GB Standards Search Result |
![]() |
1. Ready translated GB standards ![]() 2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
![]() |
GB/T 20274.1-2006 Information security technology Evaluation framework for information systems security assurance Part 1: Introduction and general model - 英文版 |
![]() |
|
![]() |
GB/T 20273-2006 Information security technology Security techniques requirement for database management system - 英文版 |
![]() |
|
![]() |
GB/T 20272-2006 Information security technology Security techniques requirement for operating system - 英文版 |
![]() |
|
![]() |
GB/T 20271-2006 Information security technology Common security techniques requirement for information system - 英文版 |
![]() |
|
![]() |
GB/T 20270-2006 Information security technology Basis security techniques requirement for network - 英文版 |
![]() |
|
![]() |
GB/T 20269-2006 Information security technology Information system security management requirements - 英文版 |
![]() |
|
![]() |
GB/T 20261-2006 Information technology - Systems security engineering - Capability maturity model - 英文版 |
![]() |
|
![]() |
GB/T 20011-2005 Information security technology -- Routers security evaluation criteria - 英文版 |
![]() |
|
![]() |
GB/T 20010-2005 Information security technology -- Packet filtering firewalls evaluation criteria - 英文版 |
![]() |
|
![]() |
GB/T 20009-2005 Information security technology -- Data base management systems security evaluation criteria - 英文版 |
![]() |
|
![]() |
GB/T 20008-2005 Information security technology -- Operating systems security evaluation criteria - 英文版 |
![]() |
|
![]() |
GB/T 19771-2005 Information technology-Security technology-Public key infrastructure-Minimum interoperability specification for PKI components - 英文版 |
![]() |
|
![]() |
GB/T 19715.2-2005 Information technology-Guidelines for the management of IT Security-Part 2:Managing and planning IT Security - 英文版 |
![]() |
|
![]() |
GB/T 19715.1-2005 Information technology-Guidelines for the management of IT Security-Part 1:Concepts and models of IT Security - 英文版 |
![]() |
|
![]() |
GB/T 19714-2005 Information technology-Security technology-Internet public key infrastructure-Certificate management protocol - 英文版 |
![]() |
|
![]() |
GB/T 19713-2005 Information technology-Security techniques-Public key in frastructure-Online certificate status protocol - 英文版 |
![]() |
|
![]() |
GB/T 17902.2-2005 Information technology-Security techniques-Digital signatures with appendix-Part2:Identity-based mechanisms - 英文版 |
![]() |
|
![]() |
GB/T 15843.5-2005 Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero knowledge techniques - 英文版 |
![]() |
|
![]() |
GB/T 18794.7-2003 Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 7:Security audit and alarms framework - 英文版 |
![]() |
|
![]() |
GB/T 18794.6-2003 Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 6:Integrity framework - 英文版 |
![]() |
|
![]() |
GB/T 18794.5-2003 Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 5:Confidentiality framework - 英文版 |
![]() |
|
![]() |
GB/T 18794.4-2003 Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 4:Non-repudiation framework - 英文版 |
![]() |
|
![]() |
GB/T 18794.3-2003 Information technology--Open Systems Interconnection--Security frameworks for open systems--Part 3:Access control framework - 英文版 |
![]() |
|
![]() |
GB/T 18237.4-2003 Information technology--Open systems interconnection--Generic upper layers security--Part 4: Protecting transfer syntax specification - 英文版 |
![]() |
|
![]() |
GB/T 18794.2-2002 Informationtechnology--Open systems interconnection--Security frameworks for open systems--Part 2:Authentication framework - 英文版 |
![]() |
|
![]() |
GB/T 18794.1-2002 Information technology--Open systems interconnection--Security frameworks for open systems--Part 1:Overview - 英文版 |
![]() |
|
![]() |
GB/T 18238.3-2002 Information technology--Security techniques--Hash-functions--Part 3:Dedicated hash-functions - 英文版 |
![]() |
|
![]() |
GB/T 18238.2-2002 Information technology--Security techniques--Hash-functions--Part 2:Hash-functions using an n-bit block cipher - 英文版 |
![]() |
|
![]() |
GB/T 5271.8-2001 Information technology--Vocabulary--Part 8:Security - 英文版 |
![]() |
|
![]() |
GB/T 18238.1-2000 Information technology--Security techniques--Hash-function--Part 1:General - 英文版 |
![]() |
Find out:553Items | To Page of: First -Previous-Next -Last | [12] [13] [14] [15] [16] [17] [18] |