ST RK

ST RK ISO 8124-3-2008
ST RK ISO 8124-3-2008
Toys. General safety requirements and testing methods. Emission of toxic for children elements
ST RK ISO 8317-2008
ST RK ISO 8317-2008
Child-safe packaging. Requirements and test methods for reusable packaging
ST RK ISO 8323-2008
ST RK ISO 8323-2008
Cargo containers. Containers for land transport (intermodal) of general purpose. Specifications.
ST RK ISO 8611-1-2008
ST RK ISO 8611-1-2008
Pallets for transportation of materials. Flat pallets. Part 1. Test methods
ST RK ISO 9297-2008
ST RK ISO 9297-2008
Water Quality. Determination of chloride content. Titrating with silver nitrate with chromate indicator (Maxweel-Mohr method)
ST RK ISO 9712-2008
ST RK ISO 9712-2008
Non-destructive testing. Personnel qualification and attestation.
ST RK ISO 9719-2008
ST RK ISO 9719-2008
Root plants. Cold storage and transportation in a refrigerator
ST RK ISO 9934-1-2008
ST RK ISO 9934-1-2008
Non-destructive testing. Magnetic particle test. Part 1. General provisions
ST RK ISO 9934-2-2008
ST RK ISO 9934-2-2008
Non-destructive testing. Magnetic particle test. Part 1. Detector medium
ST RK ISO 9934-3-2008
ST RK ISO 9934-3-2008
Non-destructive control. Magnetic-particle testing. Part 1. Equipment
ST RK ISO 9963-1-2008
ST RK ISO 9963-1-2008
Water Quality. Determination of alkalinity. Part 1. Determination of total and composite alkali content
ST RK ISO/IEC 10116-2008
ST RK ISO/IEC 10116-2008
Information technology. Security methods and tools. Operating modes of n-bit block ciphers Introduced for the first time
ST RK ISO/IEC 10181-1-2008
ST RK ISO/IEC 10181-1-2008
Information technology. Interoperability of open systems. Security Essentials for Open Systems. Part 1. Overview. Introduced for the first time
ST RK ISO/IEC 10181-2-2008
ST RK ISO/IEC 10181-2-2008
Information technology. Interoperability of open systems. Security Essentials for Open Systems. Part 2. The basics of authentication. Introduced for the first time
ST RK ISO/IEC 10181-3-2008
ST RK ISO/IEC 10181-3-2008
Information technology. Interoperability of open systems. Security Essentials for Open Systems. Part 3. Basics of access control. Introduced for the first time
ST RK ISO/IEC 10181-4-2008
ST RK ISO/IEC 10181-4-2008
Information technology. Interoperability of open systems security framework for open systems. Part 4. Basics of non-repudiation. Introduced for the first time
ST RK ISO/IEC 10181-5-2008
ST RK ISO/IEC 10181-5-2008
Information technology. Interoperability of open systems. Security Essentials for Open Systems. Part 5. Basics of confidentiality. Introduced for the first time
ST RK ISO/IEC 10181-6-2008
ST RK ISO/IEC 10181-6-2008
Information technology. Interoperability of open systems. Security Essentials for Open Systems. Part 6. Basics of integrity. Introduced for the first time
ST RK ISO/IEC 10181-7-2008
ST RK ISO/IEC 10181-7-2008
Information technology. Interoperability of open systems. Security Essentials for Open Systems. Part 7. Basics of accounting for security events and operational alerts. Introduced for the first time
ST RK ISO/IEC 11770-1-2008
ST RK ISO/IEC 11770-1-2008
Information technology. Key management security methods and tools. Part 1. General Provisions
ST RK ISO/IEC 11770-2-2008
ST RK ISO/IEC 11770-2-2008
Information technology. Key management security methods and tools. Part 2. Mechanisms using symmetric methods. Introduced for the first time
ST RK ISO/IEC 13335-1-2008
ST RK ISO/IEC 13335-1-2008
Information technology. Security methods and tools. Management of the protection of information and communication technologies. Part 1. General concepts and models for managing the protection of information and communication technologies
ST RK ISO/IEC 13335-3-2008
ST RK ISO/IEC 13335-3-2008
Information technology. Security methods and tools. Management of the protection of information and communication technologies. Part 3. Guidelines for the management of information technology protection
ST RK ISO/IEC 13335-4-2008
ST RK ISO/IEC 13335-4-2008
Information technology. Security methods and tools. Management of the protection of information and communication technologies. Part 4. Selection of protective measures
ST RK ISO/IEC 13335-5-2008
ST RK ISO/IEC 13335-5-2008
Information Technology Security Methods and Tools Managing the Protection of Information and Communication Technologies Part 5 Network Security Management Guide
ST RK ISO/IEC 13888-2-2008
ST RK ISO/IEC 13888-2-2008
Information technology. Methods and means of ensuring safety. Non-repudiation. Part 2. Mechanisms using symmetric methods. Introduced for the first time
ST RK ISO/IEC 17050.1-2008
ST RK ISO/IEC 17050.1-2008
Conformity assessment. Supplier Declaration of Conformity. Part 1. General requirements. Introduced for the first time
ST RK ISO/IEC 17050.2-2008
ST RK ISO/IEC 17050.2-2008
Conformity assessment. Supplier Declaration of Conformity. Part 2. Supporting documents. Introduced for the first time
ST RK ISO/IEC 20000-2-2008
ST RK ISO/IEC 20000-2-2008
Information Technology. Service Management Part 2. A practical guide. Introduced for the first time
ST RK ISO/IEC 27006-2008
ST RK ISO/IEC 27006-2008
Information Technology. Security method. Requirements for bodies carrying out audit and certification of information security management systems. Introduced for the first time
ST RK ISO/IEC 60850-2008
ST RK ISO/IEC 60850-2008
Railway transport. Electric voltage of traction systems. Introduced for the first time
ST RK ISO/IEC 67-2008
ST RK ISO/IEC 67-2008
Conformity assessment. Fundamentals of product certification. Introduced for the first time
Price: $598.08
ST RK ISO/IEC 68-2008
ST RK ISO/IEC 68-2008
Conformity assessment. Agreement on the recognition and acceptance of conformity assessment results. Introduced for the first time
ST RK ISO/IEC 9797-1-2008
ST RK ISO/IEC 9797-1-2008
Information technology. Security methods and means message authentication codes. Part 1. Block cipher mechanisms
ST RK ISO/IEC 9798-1-2008
ST RK ISO/IEC 9798-1-2008
Information technology. Security methods and tools. Authentication mechanisms Part 1. General Provisions
ST RK ISO/IEC 9798-2-2008
ST RK ISO/IEC 9798-2-2008
Information technology. Security methods and tools. Authentication mechanisms Part 2. Mechanisms using symmetric encryption algorithms
ST RK ISO/IEC 9798-3-2008
ST RK ISO/IEC 9798-3-2008
Information technology. Security methods and tools. Authentication mechanisms Part 3. Mechanisms using digital signature methods
ST RK ISO/IEC38500-2008
ST RK ISO/IEC38500-2008
Information technologies corporate control
ST RK ISO/MEK 20000-1-2008
ST RK ISO/MEK 20000-1-2008
Information technologies. Service management. Part 1. Specification
ST RK ISO/MEK 27001-2008
ST RK ISO/MEK 27001-2008
Information technology. Security techniques. Information security control systems. Requirements
ST RK ISO/OTU 17001-2008
ST RK ISO/OTU 17001-2008
Conformity assessment. Impartiality. Principles and requirements
ST RK ISO/OTU 17004-2008
ST RK ISO/OTU 17004-2008
Conformity assessment. Disclosure of information. Principles and requirements
ST RK ISO/OTU 17712-2008
ST RK ISO/OTU 17712-2008
Freight containers. Mechanical shutters. Specification
ST RK ISO/TO 10013-2008
ST RK ISO/TO 10013-2008
Guideline on documentation. Quality management systems.
ST RK ISO/TS 14798-2008
ST RK ISO/TS 14798-2008
Lifts (elevators), escalators and travelators. Risk analysis and its reduction methodology
ST RK ISO/TU22003-2008
ST RK ISO/TU22003-2008
Food safety management systems. Requirements for bodies performing audit and certification of food products safety control systems
ST RK ISO10261-2008
ST RK ISO10261-2008
Earth-moving machinery. Numbering system for product identification
ST RK ISO12570-2008
ST RK ISO12570-2008
Hydrothermal and performance characteristics of construction materials and products. Determination of moisture content by means of drying at high temperature

All Codes and Regulations

All Categories

Send us a message Expand Collapse

Leave your message in the form below, and we will write back by e-mail!