2025-12-9 216.73.216.21
Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
LD/T 30.5-2009 Human resources and social security electronic authentication system - Part 5: Specification of digital certificate storage medium 640.0 via email in 1~5 business day valid,,2010-3-1
LD/T 30.2-2009 Human resources and social security electronic authentication system - Part 2: Technology specification of electronic authentication system 310.0 via email in 1~3 business day superseded,2022-7-1,2010-3-1
LD/T 30.3-2009 Human resources and social security electronic authentication system - Part 3: Format specifications of digital certificate and CRL 420.0 via email in 1~3 business day superseded,2022-7-1,2010-3-1
GB/Z 24294-2009 Information security technology—Guide of implementation for internet-based E-government information security 510.0 via email in 1~3 business day superseded,2017-12-1,2010-2-1
GB/T 24363-2009 Information security technology—Specifications of emergency response plan for information security 450.0 via email in 1~3 business day valid,,2009-12-1
GB/Z 24364-2009 Information security technology—Guidelines for information security risk management 340.0 via email in 1~3 business day superseded,2023-12-1,2009-12-1
GB/T 20274.3-2008 Information security technology Evaluation framework for information systems security assurance Part 3: Management assurance 140.0 via email in 1 business day valid,,2008-12-1
GB/T 22186-2008 Information Security techniques Security technical requirements for IC card chip with CPU(EAL4+) 540.0 via email in 1~3 business day superseded,2017-3-1,2008-12-1
GB/T 17903.3-2008 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques 140.0 via email in 1~3 business day superseded2024-10-01,2024-10-1,2008-12-1
GB/T 20274.2-2008 Information security technology - Evaluation framework for information systems security assurance Part 2: Technical assurance 140.0 via email in 1 business day valid,,2008-12-1
GB/T 20274.4-2008 Information security technology Evaluation framework for information systems security assurance Part 4: Engineering assurance 140.0 via email in 1 business day valid,,2008-12-1
GB/T 15852.1-2008 Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher 280.0 via email in 1~3 business day superseded,2021-7-1,2008-12-1
GB/T 15843.1-2008 Information technology - Security techniques - Entity authentication - Part 1: General 210.0 via email in 1~3 business day superseded2018-07-01,2018-7-1,2008-11-1
GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model 550.0 via email in 1~5 business day superseded,2016-1-1,2008-11-1
GB/T 17903.1-2008 Information technilogy - Security techniques - Non-repudiation - Part 1: General 280.0 via email in 1~5 business day superseded2024-10-01,2024-10-1,2008-11-1
GB/T 22240-2008 Information security technology—Classification guide for classified protection of information systems security 140.0 via email in 1 business day superseded,2020-11-1,2008-11-1
GB/T 22081-2008 Information technology—Security techniques—Code of practice for information security management 1110.0 via email in 1~3 business day superseded2017-03-01,2017-3-1,2008-11-1
GB/T 22080-2008 Information technology - Security techniques - Information security management systems - Requirments 100.0 via email in 1 business day superseded2017-03-01,2017-3-1,2008-11-1
GB/T 15843.4-2008 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function 130.0 via email in 1~3 business day superseded2024-10-01,2024-10-1,2008-11-1
GB/T 17903.2-2008 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques 230.0 via email in 1~3 business day superseded,2022-5-1,2008-11-1
Previous Page     Next Page



Code of China
Search

LD/T 30.5-2009 Human resources and social security electronic authentication system - Part 5: Specification of digital certificate storage medium 
  Issued on: 2009-12-14   Price(USD): 640.0
LD/T 30.2-2009 Human resources and social security electronic authentication system - Part 2: Technology specification of electronic authentication system 
  Issued on: 2009-12-14   Price(USD): 310.0
LD/T 30.3-2009 Human resources and social security electronic authentication system - Part 3: Format specifications of digital certificate and CRL 
  Issued on: 2009-12-14   Price(USD): 420.0
GB/Z 24294-2009 Information security technology—Guide of implementation for internet-based E-government information security 
  Issued on: 2009-7-30   Price(USD): 510.0
GB/T 24363-2009 Information security technology—Specifications of emergency response plan for information security 
  Issued on: 2009-9-30   Price(USD): 450.0
GB/Z 24364-2009 Information security technology—Guidelines for information security risk management 
  Issued on: 2009-9-30   Price(USD): 340.0
GB/T 20274.3-2008 Information security technology Evaluation framework for information systems security assurance Part 3: Management assurance 
  Issued on: 2008-07-18   Price(USD): 140.0
GB/T 22186-2008 Information Security techniques Security technical requirements for IC card chip with CPU(EAL4+) 
  Issued on: 2008-7-16   Price(USD): 540.0
GB/T 17903.3-2008 Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques 
  Issued on: 2008-7-2   Price(USD): 140.0
GB/T 20274.2-2008 Information security technology - Evaluation framework for information systems security assurance Part 2: Technical assurance 
  Issued on: 2008-07-18   Price(USD): 140.0
GB/T 20274.4-2008 Information security technology Evaluation framework for information systems security assurance Part 4: Engineering assurance 
  Issued on: 2008-7-18   Price(USD): 140.0
GB/T 15852.1-2008 Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher  
  Issued on: 2008-7-2   Price(USD): 280.0
GB/T 15843.1-2008 Information technology - Security techniques - Entity authentication - Part 1: General 
  Issued on: 2008-6-19   Price(USD): 210.0
GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model 
  Issued on: 2008-06-26   Price(USD): 550.0
GB/T 17903.1-2008 Information technilogy - Security techniques - Non-repudiation - Part 1: General 
  Issued on: 2008-06-26   Price(USD): 280.0
GB/T 22240-2008 Information security technology—Classification guide for classified protection of information systems security 
  Issued on: 2008-06-19   Price(USD): 140.0
GB/T 22081-2008 Information technology—Security techniques—Code of practice for information security management  
  Issued on: 2008-6-19   Price(USD): 1110.0
GB/T 22080-2008 Information technology - Security techniques - Information security management systems - Requirments 
  Issued on: 2008-6-19   Price(USD): 100.0
GB/T 15843.4-2008 Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function  
  Issued on: 2008-6-19   Price(USD): 130.0
GB/T 17903.2-2008 Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques 
  Issued on: 2008-06-26   Price(USD): 230.0
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040