【国外标准】 Precast concrete products -- Required performance and methods of verification
本网站 发布时间:
2024-10-15
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>
适用范围:
暂无
标准号:
JIS A 5362:2010
标准名称:
Precast concrete products -- Required performance and methods of verification
英文名称:
Precast concrete products -- Required performance and methods of verification标准状态:
被代替-
发布日期:
2001-12-20 -
实施日期:
出版语种:
- 推荐标准
- HB 158-2010 Delivering assurance based on ISO 31000:2009 - Risk management - Principles and guidelines
- HB 246:2010 Guidelines for managing risk in sport and recreation organizations
- HB 266:2010 Guide for managing risk in not-for-profit organizations
- HB 46-2010 Fire Safety in the Home
- INCITS/ISO/IEC 18033-3:2010 (R2017) Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers
- INCITS/ISO/IEC 18033-3:2010 (R2022) Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers
- INCITS/ISO/IEC 19785-2:2006/AM 1:2010 (R2020) Information technology -- Common Biometric Exchange Formats Framework -- Part 2: Procedures for the operation of the Biometric Registration Authority Amendment 1: Additional registrations
- INCITS/ISO/IEC 19785-4:2010 (R2020) Information technology -- Common Biometric Exchange Formats Framework -- Part 4: Security block format specifications
- INCITS/ISO/IEC 19785-4:2010/COR1:2013 (R2019) Information technology -- Common Biometric Exchange Formats Framework (CBEFF) -- Part 4: Security block format specifications TECHNICAL CORRIGENDUM 1
- INCITS/ISO/IEC 19785-4:2010/COR1:2013 (R2024) Information technology - Common Biometric Exchange Formats Framework (CBEFF) - Part 4: Security block format specifications - Technical Corrigendum 1
- INCITS/ISO/IEC 27033-3:2010 (R2017) Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues
- INCITS/ISO/IEC 27033-3:2010 (R2022) Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues
- INCITS/ISO/IEC 29109-10:2010 (R2016) Information technology -- Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 -- Part 10: Hand geometry silhouette data Actions
- INCITS/ISO/IEC 29109-10:2010 (R2021) Information technology -- Conformance testing methodology for biometric data interchange formats defined in ISO/IEC 19794 -- Part 10: Hand geometry silhouette data
- INCITS/ISO/IEC 29109-1:2009/COR 1:2010 (R2019) Information technology - Conformance testing methodology for Biometric Data Interchange Records as defined in ISO/IEC 19794 - Part 1: Generalized conformance testing methodology - Technical Corrigendum 1
我的标准
购物车
400-168-0010










