China Information security GB Standards Search Result |
![]() |
1. Ready translated GB standards ![]() 2. Other English version GB Standards are not ready translated, only after get your order, then we translate them, time usually need 3-5 days . |
![]() |
GB/T 34977-2017 Information security technology—Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals - 英文版 |
![]() |
|
![]() |
GB/T 34990-2017 Information security technology—Technical requirements and testing evaluation approaches of information system security management platform products - 英文版 |
![]() |
|
![]() |
GB/T 35101-2017 Information security technology—Smart card reader security technology requirements(EAL4+) - 英文版 |
![]() |
|
![]() |
GB/T 34942-2017 Information security technology—The assessment method for security capability of cloud computing service - 英文版 |
![]() |
|
![]() |
GB/T 34976-2017 Information security technology—Security technical requirements and testing and evaluation approachs for operating system of smart mobile terminals - 英文版 |
![]() |
|
![]() |
GB/T 34975-2017 Information security technology—Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals - 英文版 |
![]() |
|
![]() |
GB/T 34095-2017 Information security technology—Technology requirements for electronic payment of mobile terminal security based on short-range radio communication technology - 英文版 |
![]() |
|
![]() |
GB/T 19668.4-2017 Information technology service—Surveillance—Part 4: Information security surveillance specification - 英文版 |
![]() |
|
![]() |
GB/T 34080.2-2017 Security specification of electronic government common platform based on cloud computing—Part 2: Information resources security - 英文版 |
![]() |
|
![]() |
GB/Z 24294.3-2017 Information security technology—Guide of implementation for Internet-based e-government information security—Part 3: Identity authentication and authorization - 英文版 |
![]() |
|
![]() |
GB/Z 24294.2-2017 Information security technology—Guide of implementation for Internet-based e-government information security—Part2: Access control and secure exchange - 英文版 |
![]() |
|
![]() |
GB/T 33563-2017 Information security technology—Security technology requirements on wireless local area network(wlan) client (EAL2+) - 英文版 |
![]() |
|
![]() |
GB/T 33560-2017 Information security technology—Cryptographic application identifier criterion specification - 英文版 |
![]() |
|
![]() |
GB/T 33561-2017 Information security technology—Vulnerability classification - 英文版 |
![]() |
|
![]() |
GB/T 32918.5-2017 Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 5: Parameter definition - 英文版 |
![]() |
|
![]() |
GB/T 33562-2017 Information security technology—Secure domain name system deployment guide - 英文版 |
![]() |
|
![]() |
GB/Z 24294.4-2017 Information security technology—Guide of implementation for Internet-based e-government information security—Part 4: Defense for terminal security - 英文版 |
![]() |
|
![]() |
GB/T 33565-2017 Information security technology—Security technology requirements for wireless local area network(wlan) access system (EAL2+) - 英文版 |
![]() |
|
![]() |
GB/T 35317-2017 Information classified security protection requirements for systems of IoTPS - 英文版 |
![]() |
|
![]() |
GB/T 35275-2017 Information security technology—SM2 cryptographic algorithm encrypted signature message syntax specification - 英文版 |
![]() |
|
![]() |
GB/T 35276-2017 Information security technology—SM2 cryptographic algorithm usage specification - 英文版 |
![]() |
|
![]() |
GB/T 29246-2017 Information technology—Security techniques—Information security management systems—Overview and vocabulary - 英文版 |
![]() |
|
![]() |
GB/T 35278-2017 Information security technology—Technical requirements for mobile terminal security protection - 英文版 |
![]() |
|
![]() |
GB/T 35279-2017 Information security technology—Security reference architecture of cloud computing - 英文版 |
![]() |
|
![]() |
GB/T 35277-2017 Information security technology—Security technical requirements and testing and evaluation approaches for antivirus gateway products - 英文版 |
![]() |
|
![]() |
GB/T 15843.1-2017 Information technology—Security techniques—Entity authentication—Part 1: General - 英文版 |
![]() |
|
![]() |
GB/T 15843.2-2017 Information technology—Security techniques—Entity authentication—Part 2: Mechanisms using symmetric encipherment algorithms - 英文版 |
![]() |
|
![]() |
GB/T 35281-2017 Information security technology - Security technique requirements for application servers in mobile Internet - 英文版 |
![]() |
|
![]() |
GB/T 35280-2017 Information security technology—Requirement and code of conduct for security testing bodies of information technology products - 英文版 |
![]() |
|
![]() |
GB/T 35284-2017 Information security technology - Requirements and assessment methods for website identity and system security - 英文版 |
![]() |
Find out:542Items | To Page of: First -Previous-Next -Last | [4] [5] [6] [7] [8] [9] [10] |