2025-12-9 216.73.216.21
Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 15843.3-2008 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques 150.0 via email in 1~3 business day superseded,2016-11-1,2008-11-1
GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements 2475.0 via email in 1~5 business day superseded,2016-1-1,2008-11-1
GB/T 17964-2008 Information technology - Security techniques - Modes of operation for a block cipher 140.0 via email in 1 business day superseded,2022-5-1,2008-11-1
GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements 1510.0 via email in 1~5 business day superseded,2016-1-1,2008-11-1
GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security 140.0 via email in 1 business day superseded2019-12-01,2019-12-1,2008-11-1
GB/T 15843.2-2008 Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm 190.0 via email in 1~3 business day superseded,2018-7-1,2008-11-1
GB/T 21050-2007 Information security techniques—Security requirements for network switch(EAL3) 885.0 via email in 1~5 business day superseded,2020-3-1,2008-1-1
GB/T 21052-2007 Information security technology—Physical security technical requirement for information system 570.0 via email in 1~5 business day valid,,2008-1-1
GB/T 21054-2007 Information security techniques—Public key infrastructure—Evaluation criteria for security classification protection of PKI system 390.0 via email in 1~3 business day superseded,2023-10-1,2008-1-1
GB/T 21053-2007 Information security techniques—Public key infrastructure—Technology requirement for security classification protection of PKI system 930.0 via email in 1~3 business day superseded,2023-10-1,2008-1-1
GB/T 21028-2007 Information security technology—Security techniques requirement for server 360.0 via email in 1~3 business day superseded,2021-7-1,2007-12-1
GB/T 18018-2007 Information security technology—Technical requirements for router security 240.0 via email in 1~3 business day superseded,2020-3-1,2007-12-1
GB/T 20979-2007 Information security technolgy—Technical requirments for iris recognition system 390.0 via email in 1~3 business day superseded,2020-3-1,2007-11-1
GB/Z 20986-2007 Information security technology—Guidelines for the category and classification of information security incidents 150.0 via email in 1~3 business day superseded,2023-12-1,2007-11-1
GB/Z 20985-2007 Information technology—Security techniques—Information security incident management guide 660.0 via email in 1~3 business day superseded,2018-7-1,2007-11-1
GB/T 20988-2007 Information security technology—Disaster recovery specifications for information systems 140.0 via email in 1~3 business day to be superseded,2026-1-1,2007-11-1
GB/T 20983-2007 Information security technology—Evaluation criteria for online banking system information security assurance 1260.0 via email in 1~3 business day abolished2017-12-15,,2007-11-1
GB/T 20987-2007 Information security technoloy—Evaluation criteria for online stock trading information systems security assurance 1260.0 via email in 1~3 business day abolished2017-12-15,,2007-11-1
GB/T 20984-2007 Information security technology-Risk assessment specification for information security 220.0 via email in 1~3 business day superseded,2022-11-1,2007-11-1
GB/T 20520-2006 Information security technology - Public key infrastructure - Time stamp specification 140.0 via email in 1~3 business day to be superseded,2026-2-1,2007-2-1
Previous Page     Next Page



Code of China
Search

GB/T 15843.3-2008 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques  
  Issued on: 2008-6-19   Price(USD): 150.0
GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements 
  Issued on: 2008-06-26   Price(USD): 2475.0
GB/T 17964-2008 Information technology - Security techniques - Modes of operation for a block cipher 
  Issued on: 2008-6-26   Price(USD): 140.0
GB/T 18336.3-2008 Information Technology - Security Techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements 
  Issued on: 2008-06-26   Price(USD): 1510.0
GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security  
  Issued on: 2008-6-19   Price(USD): 140.0
GB/T 15843.2-2008 Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm 
  Issued on: 2008-06-19   Price(USD): 190.0
GB/T 21050-2007 Information security techniques—Security requirements for network switch(EAL3) 
  Issued on: 2007-10-17   Price(USD): 885.0
GB/T 21052-2007 Information security technology—Physical security technical requirement for information system 
  Issued on: 2007-10-17   Price(USD): 570.0
GB/T 21054-2007 Information security techniques—Public key infrastructure—Evaluation criteria for security classification protection of PKI system 
  Issued on: 2007-10-17   Price(USD): 390.0
GB/T 21053-2007 Information security techniques—Public key infrastructure—Technology requirement for security classification protection of PKI system 
  Issued on: 2007-10-17   Price(USD): 930.0
GB/T 21028-2007 Information security technology—Security techniques requirement for server 
  Issued on: 2007-6-29   Price(USD): 360.0
GB/T 18018-2007 Information security technology—Technical requirements for router security 
  Issued on: 2007-7-11   Price(USD): 240.0
GB/T 20979-2007 Information security technolgy—Technical requirments for iris recognition system 
  Issued on: 2007-7-30   Price(USD): 390.0
GB/Z 20986-2007 Information security technology—Guidelines for the category and classification of information security incidents 
  Issued on: 2007-7-30   Price(USD): 150.0
GB/Z 20985-2007 Information technology—Security techniques—Information security incident management guide 
  Issued on: 2007-7-30   Price(USD): 660.0
GB/T 20988-2007 Information security technology—Disaster recovery specifications for information systems 
  Issued on: 2007-6-14   Price(USD): 140.0
GB/T 20983-2007 Information security technology—Evaluation criteria for online banking system information security assurance 
  Issued on: 2007-7-30   Price(USD): 1260.0
GB/T 20987-2007 Information security technoloy—Evaluation criteria for online stock trading information systems security assurance 
  Issued on: 2007-7-30   Price(USD): 1260.0
GB/T 20984-2007 Information security technology-Risk assessment specification for information security 
  Issued on: 2007-7-30   Price(USD): 220.0
GB/T 20520-2006 Information security technology - Public key infrastructure - Time stamp specification  
  Issued on: 2006-8-30   Price(USD): 140.0
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040