China Information security GB Standards Search Result |
1. Ready translated GB standards and Chinese version GB Standards, you can purchase directly in the web page; After receive your payment, we will send the GB Standards PDF file to your Email within
1~3 days.
2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
GB/T 41817-2022 Information security Technology Personal Information Security Engineering Guidelines - 英文版 |
|||
GB/T 39204-2022 Information security Technology - Critical Information Infrastructure Security Protection Requirements - 英文版 |
|||
GB/T 40018-2021 Information security technology—Certificate request and application protocol based on multiple channels - 英文版 |
|||
GB/T 39786-2021 Information security technology—Baseline for information system cryptography application - 英文版 |
|||
GB/T 39770-2021 Information technology service—Service security requirements - 英文版 |
|||
GB/T 25068.5-2021 Information technology—Security techniques—Network security—Part 5: Securing communications across networks using virtual private networks - 英文版 |
|||
GB/T 17901.3-2021 Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques - 英文版 |
|||
GB/T 29765-2021 Information security technology—Technical requirements and testing and evaluating approaches of website data recovery products - 英文版 |
|||
GB/T 20275-2021 Information security technology -- Technical requirements and testing and evaluation approaches for network-based intrusion detection system - 英文版 |
|||
GB/T 29766-2021 Information security technology—Technical requirements and testing and evaluating approaches of website data recovery products - 英文版 |
|||
GB/T 30272-2021 Information security technology—Public key infrastructure—Testing and assessment of compliance with standards - 英文版 |
|||
GB/T 17903.2-2021 Information technology—Security techniques—Non-repudiation—Part 2:Mechanisms using symmetric techniques - 英文版 |
|||
GB/T 17964-2021 Information security technology—Modes of operation for a block cipher - 英文版 |
|||
GB/T 40645-2021 Information security technology—General requirements for security of Internet information services - 英文版 |
|||
GB/T 40856-2021 Technical requirements and test methods for cybersecurity of on-board information interactive system - 英文版 |
|||
GB/T 33133.3-2021 Information security technology—ZUC stream cipher algorithm—Part 3:Integrity algorithm - 英文版 |
|||
GB/T 33133.2-2021 Information security technology—ZUC stream cipher algorithm—Part 2:Confidentiality algorithm - 英文版 |
|||
GB/T 40813-2021 Information security technology—Security protection technical requirements and testing evaluation methods of industrial control systems - 英文版 |
|||
GB/T 40652-2021 Information security technology—Guide to malware incident prevention and handling - 英文版 |
|||
GB/T 40653-2021 英文名称:Information security technology—Technical requirements for security processor - 英文版 |
|||
GB/T 40640.2-2021 Informationalized management of chemicals—Part 2:Information security - 英文版 |
|||
GB/T 40660-2021 Information security technology—General requirements for biometric information protection - 英文版 |
|||
GB/T 40651-2021 Information security technique—Entity authentication assurance framework - 英文版 |
|||
GB/T 40650-2021 Information security technology—Trusted computing specification—Trusted platform control module - 英文版 |
|||
GB/T 39205-2020 Information security technology—Light-weight authentication and access control mechanism - 英文版 |
|||
GB/T 20283-2020 Information security technology—Guide for the production of protection profiles and security targets - 英文版 |
|||
GB/T 38674-2020 Information security technology—Guideline on secure coding of application software - 英文版 |
|||
GB/T 38671-2020 Information security technology—Technical requirements for remote face recognition system - 英文版 |
|||
GB/Z 38649-2020 Information security technology—Guide of information security assurance framework for smartcities - 英文版 |
|||
GB/T 38647.2-2020 Information technology—Security techniques—Anonymous digital signatures—Part 2: Mechanisms using a group public key - 英文版 |
Find out:542Items | To Page of: First -Previous-Next -Last | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |