"Techniques " CNS Standards List| Thermal insulation | Studs Stud | Method Test | Face Face | Standard Classification | Spark Plugs | Compression Rivets | Hand Wheels | |
|
CNS 14563
2018 Edition Information technology-Security Techniques-Digital signature schemes giving message recovery-Part 2:Mechanisms using a hash-function 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…·è¨Šæ¯å›žå¾©çš„數ä½ç°½ç« 方案ï¼ç¬¬ï¼’部:使用雜湊函數之機制 |
||
|
CNS 14686
2018 Edition Information technology -Security Techniques -Procedures for the registration of cryptographic algorithms 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å¯†ç¢¼æ¼”ç®—æ³•çš„è¨»å†Šç¨‹åº |
||
|
CNS 14381-2
2018 Edition Information technology-Security Techniques - Key management - Part 2:Mechanisms using symmetric techniques 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼é‡‘鑰管ç†ï¼ç¬¬2部:使用å°ç¨±æŠ€è¡“的機制 |
||
|
CNS 15134-5
2018 Edition Information technology - Security Techniques - IT network security - Part 5: Securing communications across networks using virtual private networks 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“網路安全ï¼ç¬¬5部:使用虛擬ç§æœ‰ç¶²è·¯ä¿å…¨è·¨ç¶²è·¯ä¹‹é€šè¨Š |
||
|
CNS 14629-3
2018 Edition Information technologyï¼Security Techniquesï¼Digital signature with appendixï¼Part 3: Certificate-based mechanisms 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…·é™„件之數ä½ç°½ç« ï¼ç¬¬3部:憑è‰åŸºç¤Žæ©Ÿåˆ¶ |
||
|
CNS 14676-6
2017 Edition Electromagnetic compatibility (EMC) - Testing and measurement Techniques- Part 6 : Immunity to conducted disturbances,induced by radio-frequency fields é›»ç£ç›¸å®¹ï¼æ¸¬è©¦èˆ‡é‡æ¸¬æŠ€è¡“ï¼ç¬¬ï¼–éƒ¨ï¼šå°„é »å ´æ„Ÿæ‡‰çš„å‚³å°Žæ“¾å‹•æŠ—æ“¾åŠ› |
||
|
CNS 14650
2017 Edition Information technology ? Automatic identification and data capture Techniques – Code 128 bar code symbology specification 資訊技術ï¼è‡ªå‹•è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術ï¼Code 128 æ¢ç¢¼ç¬¦è™Ÿè¡¨ç¤ºæ³• |
||
|
CNS 31010
2017 Edition Risk management - Risk assessment Techniques 風險管ç†ï¼é¢¨éšªè©•é‘‘技術 |
||
|
CNS 15964
2017 Edition Information technology − Automatic identification and data capture Techniques − QR Code bar code symbology 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼QR 碼æ¢ç¢¼ç¬¦è™Ÿè¡¨ç¤ºæ³• |
||
|
CNS 27036-1
2017 Edition Information technology − Security Techniques − Information security for supplier relationships − Part 1: Overview and concepts 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼ä¾›æ‡‰è€…關係資訊安全ï¼ç¬¬1 部:概觀åŠæ¦‚念 |
||
|
CNS 15963
2017 Edition Information technology ‒ Automatic identification and data capture Techniques – Data Matrix bar code symbology 資訊技術ï¼è‡ªå‹•è˜åˆ¥åŠè³‡æ–™æ“·å–技術ï¼è³‡æ–™çŸ©é™£æ¢ç¢¼ç¬¦è™Ÿè¡¨ç¤ºæ³• |
||
|
CNS 15328
2017 Edition Information technology - Automatic identification and data capture Techniques - Radio frequency identification device performance test methods 資訊技術ï¼è‡ªå‹•è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術ï¼ç„¡ç·šå°„é »è˜åˆ¥è£ç½®æ•ˆèƒ½æ¸¬è©¦æ–¹æ³• |
||
|
CNS 29101
2017 Edition Information technology − Security Techniques − Privacy architecture framework 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼éš±ç§æ¬Šæž¶æ§‹æ¡†æž¶ |
||
|
CNS 15275-3
2017 Edition Information technology - Automatic identification and data capture (AIDC) Techniques - Harmonized vocabulary - Part 3: Radio frequency identification (RFID) 資訊技術—自動è˜åˆ¥èˆ‡è³‡æ–™æ“·å–æŠ€è¡“â€”èª¿å’Œè©žå½™â€”ç¬¬ï¼“éƒ¨ï¼šç„¡ç·šå°„é »è˜åˆ¥ |
||
|
CNS 15326
2017 Edition Information technology - Automatic identification and data capture Techniques - Syntax for high-capacity ADC media 資訊技術—自動è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術—高容é‡è‡ªå‹•è³‡æ–™æ“·å–媒體之語法 |
||
|
CNS 15275-1
2017 Edition Information technology - Automatic identification and data capture (AIDC) Techniques - Harmonized vocabulary - Part 1: General terms relating to AIDC 資訊技術—自動è˜åˆ¥èˆ‡è³‡æ–™æ“·å–技術—調和詞彙—第1部:自動è˜åˆ¥èˆ‡è³‡æ–™æ“·å–相關用語 |
||
|
CNS 15134-2
2017 Edition Information technology - Security Techniques - IT network security - Part 2: Network security architecture 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼è³‡è¨ŠæŠ€è¡“網路安全ï¼ç¬¬2部:網路安全架構 |
||
|
CNS 15516
2017 Edition Information technology - Security Techniques - Selection, deployment and operations of intrusion detection systems 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å…¥ä¾µåµæ¸¬ç³»çµ±ä¹‹é¸æ“‡ã€éƒ¨ç½²åŠé‹ä½œ |
||
|
CNS 15427
2017 Edition Information technology - Security Techniques - Specification of TTP services to support the application of digital signatures 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼æ”¯æ´æ•¸ä½ç°½ç« 應用之å—信賴第三方æœå‹™è¦æ ¼ |
||
|
CNS 15428
2017 Edition Information technology - Security Techniques - Security information objects for access control 資訊技術ï¼å®‰å…¨æŠ€è¡“ï¼å˜å–控制之安全資訊物件 |
||
|
CNS 31010
2012 Edition Risk management - Risk assessment Techniques 風險管ç†ï¼é¢¨éšªè©•é‘‘技術 |
Find out:111Items | To Page of: First -Previous-Next -Last | 1 2 3 4 |