搜索
登錄
注冊
網(wǎng)絡優(yōu)化工程師招聘專欄
4G/LTE通信工程師最新職位列表
通信實習生/應屆生招聘職位
MSCBSC 移動通信論壇
»
資料大雜燴(免威望)
» 移動通信安全的權威著作。不要失之交臂,趕快收藏起來吧,朋友們
討論帖
資料帖
投票帖
懸賞帖
閱讀:
7103
回復:
7
關注樓主
移動通信安全的權威著作。不要失之交臂,趕快收藏起來吧,朋友們
bigfool
中級會員
發(fā)短消息
關注Ta
積分 922
帖子 206
威望 4214 個
禮品券 18 個
專家指數(shù) -108
注冊 2009-10-9
專業(yè)方向 手機軟件
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#1
大
中
小
使用道具
發(fā)表于 2009-10-31 21:43:02
只看樓主
【資料名稱】:移動通信的安全性
【資料作者】:Noureddine Boudriga
【資料日期】:2009
【資料語言】:英文
【資料格式】:PDF
【資料目錄和簡介】:
Preface.......................................................................................................... xxv
Acknowledgments.......................................................................................xxxi
About the Author..................................................................................... xxxiii
Section I Basic Techniques for Mobi le
Communic ations and Security
1. Threats, Hacking, and Viruses in Mobile Communications...................3
1.1 Introduction to Mobile Communications...........................................3
1.1.1 Security and Privacy in Mobile Communications..................5
1.1.2 Basic Security Requirements..................................................6
1.1.2.1 End User Perspective.............................................6
1.1.2.2 Communication Provider Perspective....................7
1.1.2.3 For Governments...................................................7
1.2 Basics of Mobile Communications.....................................................8
1.2.1 Infrastructure-Based Wireless Networks................................9
1.2.1.1 Cellular Network Security...................................10
1.2.1.2 WLAN Security..................................................10
1.2.1.3 Virtual Private Networks.....................................11
1.2.1.4 Mobile IP............................................................11
1.2.2 Infrastructureless Networks.................................................12
1.2.2.1 Distributing Encryption Keys in
Infrastructureless Wireless Networks...................13
1.2.2.2 Routing Security in Infrastructureless
Wireless Networks...............................................14
1.2.3 Heterogeneous Wireless Networks.......................................15
1.3 Wireless Vulnerabilities and Threats.................................................17
1.3.1 WLAN Vulnerabilities and Threats.....................................18
1.3.2 Cellular System Vulnerabilities and Threats.........................18
1.3.3 Application-Based Threats...................................................19
viii Contents
1.3.3.1 Content-Based Threats.........................................19
1.3.3.2 Mixed Application...............................................20
1.4 Attacks in Mobile Environments......................................................21
1.4.1 Typical Attacks....................................................................21
1.4.1.1 Class of Illicit Use Attacks...................................21
1.4.1.2 Wireless Spoofing................................................22
1.4.1.3 Man-in-the-Middle Attacks.................................22
1.4.1.4 Denial of Service Attacks.....................................22
1.4.2 Distributed DoS Attacks in Mobile Communications.........24
1.4.2.1 Targeted Environments.......................................25
1.4.2.2 Defending against DDoS Attacks........................26
1.5 Mobile Malware...............................................................................27
1.5.1 Basics on Malware...............................................................27
1.5.2 Examples of Mobile Malware..............................................30
1.6 Prevention Techniques in Mobile Systems........................................32
1.6.1 Firewall in Mobile Communication....................................32
1.6.2 Encryption-Based Mechanisms for Prevention................... 34
1.6.2.1 WLAN Authentication Flaws..............................35
1.6.2.2 Wireless Ad Hoc Authentication Flaws................36
1.6.2.3 Cellular Authentication Flaws.............................37
1.7 Intrusion Detection in Wireless Communications............................38
1.7.1 Wireless Detection Approaches...........................................39
1.7.1.1 Mobile Profiles Construction...............................39
1.7.1.2 Monitoring Wireless Devices...............................39
1.7.1.3 Radio Frequency Fingerprinting (RFF).............. 40
1.7.2 Cluster-Based Detection in Ad Hoc Networks....................41
References.................................................................................................. 42
2. Access Control and Authentication in Mobile Communications..........45
2.1 Wireless System Security..................................................................45
2.2 Cryptography Basics........................................................................ 46
2.2.1 Symmetric Cryptography....................................................47
2.2.1.1 Classification of Symmetric Cryptosystems.........48
2.2.1.2 Encrypting with AES..........................................49
2.2.2 Asymmetric Cryptography..................................................51
2.2.2.1 Encrypting with RSA..........................................53
2.2.2.2 Encrypting with ElGamel....................................54
2.2.3 Symmetric vs. Asymmetric Cryptography...........................55
2.3 Insecurity of Cryptosystems.............................................................56
2.3.1 Insecurity of Secret Cryptosystems......................................56
2.3.2 Insecurity of Public Cryptosystems.....................................57
2.3.2.1 Attacks Based on Small Private Keys...................57
2.3.2.2 Attacks Based on Small Public Exponents...........58
Contents ix
2.3.2.3 Cycling Attacks...................................................58
2.3.2.4 Message Concealing............................................58
2.4 Digital Signature..............................................................................59
2.4.1 The RSA Signature Scheme.................................................60
2.4.2 The DSA Signature Scheme.................................................61
2.4.3 Message Digest....................................................................62
2.5 Authentication..................................................................................63
2.5.1 Weak Authentication Schemes.............................................65
2.5.1.1 Password-Based Authentication...........................65
2.5.1.2 PIN-Based Authentication...................................67
2.5.2 Strong Authentication Schemes...........................................67
2.6 Attacks against Authentication in Mobile Wireless Networks..........72
2.6.1 Common Attacks................................................................72
2.6.2 Common Guidelines for Protection.....................................74
2.7 Authorization and Access Control in Mobile Communication.........75
2.7.1 Access Control.....................................................................75
2.7.2 Certificate-Based Authorization.......................................... 77
2.8 Key Distribution and Management..................................................80
2.8.1 Beller-Yacobi Protocol..........................................................80
2.8.2 Aziz-Diffie’s Protocol...........................................................81
2.8.3 ASPeCT Protocol................................................................82
References...................................................................................................83
3. Common Techniques for Mobile Communications Security................85
3.1 Introduction.....................................................................................85
3.2 Securing Network Protocols.............................................................86
3.2.1 IPsec Processing...................................................................87
3.2.1.1 Outgoing Traffic Processing................................88
3.2.1.2 Incoming Traffic Management........................... 90
3.2.2 IPsec Limitations.................................................................91
3.2.2.1 Limitations of Expressive Power..........................92
3.2.2.2 Limitations of Application Control......................92
3.2.2.3 Limitations of the Authorization Procedures.......92
3.2.2.4 Limitations of the SAD and SPD Protection.......93
3.2.2.5 Application-Specific Security Solutions...............93
3.3 Attacks on IPsec...............................................................................94
3.3.1 Destination Address Rewriting-Based Attack......................94
3.3.2 Attacks Based on IP Options Processing.............................96
3.3.3 Attacks Based on Protocol Field Manipulation....................96
3.3.4 Proposal Attack...................................................................96
3.3.5 Oracle ESP Padding Attack.................................................97
3.4 Transport Protocols Security............................................................98
x Contents
3.4.1 SSL/TLS Features...............................................................98
3.4.2 Security Limitations of SSL/TLS.......................................101
3.4.3 WTLS...............................................................................102
3.4.3.1 Record Protocol.................................................102
3.4.3.2 Change Cipher Spec Protocol............................103
3.4.3.3 Alert Protocol....................................................103
3.4.3.4 Handshake Protocol..........................................104
3.4.4 Security Features of WTLS...............................................105
3.4.4.1 Authentication...................................................105
3.4.4.2 Data Integrity....................................................106
3.4.5 SSH...................................................................................107
3.5 Attacks against Transport Security Services....................................109
3.5.1 Attacks against SSL and TLS............................................109
3.5.1.1 Cipher Suite Rollback Attack............................. 110
3.5.1.2 Dropping Change Cipher Specification
Messages............................................................ 110
3.5.1.3 Key-Exchange Algorithm Rollback Attack........ 110
3.5.2 Attacks against WTLS...................................................... 111
3.5.2.1 Predictable IVs................................................... 111
3.5.2.2 35-Bit DES Encryption.....................................112
3.5.2.3 Unauthenticated Alert Messages........................112
3.6 Public Key Infrastructure...............................................................112
3.6.1 PKI Components...............................................................113
3.6.1.1 End Entity.........................................................113
3.6.1.2 Public Key Certificate (PKC, or just
Certificate)......................................................... 114
3.6.1.3 Certification Authority (CA)............................. 114
3.6.1.4 Certificate Repository (CR)............................... 115
3.6.1.5 Certificate Revocation List (CRL) Issuer........... 115
3.6.1.6 Registration Authority (RA).............................. 115
3.6.2 PKI Functions................................................................... 116
3.6.2.1 Registration....................................................... 116
3.6.2.2 Initialization...................................................... 117
3.6.2.3 Certificate Generation....................................... 117
3.6.2.4 Certificate Update............................................. 118
3.6.2.5 Revocation......................................................... 118
3.6.2.6 Key Pair Management....................................... 118
3.6.2.7 Cross-Certification............................................ 119
3.6.3 Wireless PKI...................................................................... 119
3.6.3.1 WPKI Requirements.........................................120
3.6.3.2 An Example of WPKI Architecture...................121
References.................................................................................................125
Contents xi
4. Smart Card Security: The SIM/USIM Case........................................127
4.1 Introduction...................................................................................127
4.2 Basic on Smart Cards.....................................................................129
4.2.1 Components of a Smart Card............................................130
4.2.2 Smart Card Applications...................................................132
4.2.3 Security of Smart Cards....................................................135
4.3 Smart Card and Communication...................................................136
4.3.1 Communication with the Terminal...................................136
4.3.2 Subscriber Identity Module...............................................138
4.3.3 The Smart Card in UMTS................................................139
4.4 Attacks against Smart Cards...........................................................140
4.4.1 Invasive Attack Techniques................................................140
4.4.1.1 Removing the Chip from the Card Attacks.......141
4.4.1.2 Reverse Engineering Attacks on the Chipset.....141
4.4.1.3 Microprobing Attack.........................................141
4.4.1.4 Semi-Invasive Attacks........................................142
4.4.2 Non-Invasive Attacks.........................................................142
4.4.2.1 Differential Fault Analysis (DFA)......................145
4.4.2.2 Data Remanence...............................................146
4.5 Security of Log Files in Smart Cards..............................................147
4.5.1 Modeling the Log File Manager in Smart Cards...............148
4.5.1.1 The Threat Model..............................................148
4.5.1.2 The Event Model...............................................149
4.5.1.3 The Entity Model..............................................150
4.5.2 Secure Logs in Untrusted Environment.............................150
4.5.2.1 First Scenario..................................................... 152
4.5.2.2 Second Scenario................................................ 153
4.5.2.3 Third Scenario...................................................154
4.5.3 Partitioning Attack............................................................154
4.6 Forensics and SIM/USIM Cards....................................................156
4.6.1 SIM Card Investigation..................................................... 157
4.6.2 SIM Card Files Investigation............................................. 159
References................................................................................................. 161
Section II Attack and Protection Techniques
in Mobi le Communic ation Networks
5. Security of GSM Networks..................................................................165
5.1 Introduction...................................................................................165
5.2 GSM Mobility Scheme...................................................................166
5.2.1 GSM Infrastructure...........................................................166
5.2.1.1 The Mobile Station (MS)...................................166
5.2.1.2 The Base Station Subsystem (BSS).....................168
xii Contents
5.2.1.3 Mobile Services Switching Center (MSC).........168
5.2.1.4 The Operation and Support System (OMC)......168
5.2.1.5 Home Location Register (HLR)........................168
5.2.1.6 Visitor Location Register (VLR)........................168
5.2.1.7 Authentication Center (AuC)............................169
5.2.1.8 Equipment Identity Register (EIR)....................169
5.2.2 Mobility Management.......................................................169
5.2.3 Protocol Architecture.........................................................171
5.2.3.1 Physical Layer....................................................171
5.2.3.2 Data Link Layer................................................172
5.2.3.3 Message Layer....................................................172
5.3 GSM Security Model......................................................................173
5.3.1 Security Requirements....................................................... 174
5.3.1.1 Protection of Call-Setup Information and
Communication Services................................... 174
5.3.1.2 Privacy of User-Location, Calling Patterns,
and User-Data................................................... 174
5.3.1.3 Replication and Clone Resistant Design............175
5.3.1.4 Equipment Identifiers........................................175
5.3.2 GSM Security Model.........................................................175
5.3.2.1 Anonymity........................................................176
5.3.2.2 Authentication...................................................177
5.3.2.3 Confidentiality..................................................178
5.4 Basic Attacks on GSM....................................................................179
5.4.1 GSM Security Flaws..........................................................179
5.4.2 Impersonation Attacks.......................................................180
5.4.3 Attacks against Anonymity................................................181
5.4.3.1 Passive Monitoring............................................181
5.4.3.2 Active Monitoring.............................................182
5.4.4 Attacks on the Authentication Algorithm..........................183
5.4.4.1 Cloning Based on Physical Access to the SIM.... 184
5.4.4.2 Cloning Attacks over the Air.............................185
5.5 GSM Encryption Algorithms.........................................................186
5.5.1 Algorithm A5/2.................................................................187
5.5.2 Algorithm A5/1.................................................................189
5.6 Advanced Attacks on GSM............................................................190
5.6.1 Attacks against Confidentiality.........................................190
5.6.1.1 Brute-Force Attacks........................................... 191
5.6.1.2 Cryptanalysis-Based Attacks on A5/1................192
5.6.2 Cryptanalysis Attacks on A5/2..........................................193
5.6.2.1 Using A5/2 Cryptanalysis to Target the
Confidentiality of A5/1 and A5/3......................193
5.6.2.2 The Known Plaintext Attack.............................195
Contents xiii
5.6.3 Denial of Service Attacks...................................................196
5.6.3.1 Physical Intervention-Based Denial of
Service Attacks..................................................196
5.6.3.2 Logical Intervention-Based Denial of Service
Attacks..............................................................197
5.7 Improving GSM Security...............................................................197
5.7.1 Improving Authentication Protection................................198
5.7.2 Other Improvements.........................................................199
5.7.2.1 GSM—Newer A3/A8 Implementation..............199
5.7.2.2 GSM—A5/3 Ciphering.................................... 200
5.7.2.3 Protecting against Distributed DoS Attacks..... 200
References.................................................................................................202
6. Security of 3G Networks.....................................................................203
6.1 Introduction...................................................................................203
6.1.1 Security Challenges...........................................................205
6.1.2 Security Threats................................................................ 206
6.1.3 Retention of 2G Robust Features.......................................207
6.2 The 3G Networks.......................................................................... 208
6.2.1 Network Architecture....................................................... 208
6.2.1.1 The Mobile Station (MS)...................................209
6.2.1.2 The Access Network (UTRAN)........................210
6.2.1.3 The Core Network (CN)................................... 211
6.2.2 UMTS Security Architecture............................................213
6.3 Network Access Security................................................................214
6.3.1 User Identity Confidentiality.............................................214
6.3.2 Authentication and Key Agreement...................................216
6.3.3 Data Confidentiality and Integrity Protection of
Signaling Messages............................................................219
6.4 Network Domain Security............................................................ 220
6.4.1 IP-Based Protocol..............................................................221
6.4.2 SS7-Based Protocols...........................................................221
6.4.3 Traditional Network Security Features............................. 222
6.5 User, Application, and Visibility Domain Security.........................224
6.5.1 Application Domain Security............................................224
6.5.2 Security of Visibility and Configurability Domain............225
6.6 Security Functions......................................................................... 226
6.6.1 Integrity and Confidentiality Algorithms......................... 226
6.6.2 The KASUMI Block Cipher............................................. 228
6.7 Security Features of 3G Networks..................................................229
6.7.1 Mitigating 2G Weaknesses................................................229
6.7.1.1 Denial of Service...............................................229
6.7.1.2 Identity Catching..............................................230
xiv Contents
6.7.1.3 Impersonation of the Network Attacks..............230
6.7.1.4 Eavesdropping on User Data.............................232
6.7.1.5 Attacks Aiming at the Impersonation of the
User...................................................................233
6.7.2 New Security Features and the Security of New Service... 234
6.8 Attacks on 3G Networks................................................................235
6.8.1 Classification of Attacks on 3G Networks.........................237
6.8.2 Examples of Attacks..........................................................239
6.8.2.1 Attacks Targeting the Call Forwarding
Service...............................................................239
6.8.2.2 Attacks Targeting the Client Billing Service......240
6.8.2.3 Attacks Targeting the Location Based
Instant Message System.....................................241
References.................................................................................................242
中間章節(jié)目錄不列在這兒啦,要不超過內容太多,超過上傳字數(shù)限制了。
References................................................................................................ 564
15. Security of Multimedia Communications...........................................567
15.1 Introduction...................................................................................567
15.2 Transmission Issues of Mobile Multimedia.....................................571
15.2.1 Transport Error Protection................................................571
15.2.2 Congestion Control for Multimedia..................................573
15.2.3 QoS Control of Mobile Multimedia..................................574
15.3 Securing Copyright in Mobile Networks........................................576
15.3.1 Copyright Requirements...................................................576
15.3.2 Watermarking...................................................................578
15.3.3 Digital Fingerprinting.......................................................580
15.4 Major Watermarking Techniques...................................................583
15.4.1 Image Watermarks............................................................583
15.4.1.1 Least Significant Bit Modification (LSB)...........584
15.4.1.2 Correlation-Based Techniques...........................584
15.4.1.3 Frequency Domain Watermarks........................585
15.4.2 Video Watermarking.........................................................587
15.5 Attacks against Mobile Multimedia................................................589
15.5.1 Attack Classification..........................................................589
15.5.2 Attacks Targeting Fingerprinting Schemes........................591
Contents xxiii
15.5.2.1 Single-User Attacks...........................................591
15.5.2.2 Multimedia Collusion Attacks...........................592
15.5.3 Attacks Targeting Watermarking Schemes........................593
15.5.3.1 Synchronization Attacks....................................593
15.5.3.2 StirMark Attack.................................................594
15.5.3.3 Unauthorized Embedding Attacks.....................594
15.5.3.4 Scrambling Attacks............................................595
15.5.3.5 Unauthorized Removal......................................595
15.6 Countermeasures against Watermarking Attacks...........................595
15.6.1 General Rules....................................................................596
15.6.2 Countermeasures against Collusion Attacks......................596
15.6.3 Countermeasures against Ambiguity Attacks....................596
15.6.4 Countermeasures against Embedding Attacks...................597
15.6.5 Use of Attack-Resilient Block-Based Watermark
Decoder.............................................................................597
15.6.6 Preventing Unauthorized Detection..................................599
15.7 Security of Mobile Multimedia Multicasting Schemes...................599
15.7.1 Securing Multicasting Schemes.........................................599
15.7.2 Authentication of Multimedia Content.............................601
References.................................................................................................602
Index............................................................................................................605
附件下載列表:
2009-10-31 21:43:02 下載次數(shù): 30
[移動通信的安全性].Security.of.Mobile.Communications.pdf
(5.34 MB)
掃碼關注5G通信官方公眾號,免費領取以下5G精品資料
1、回復“
YD5GAI
”免費領取《
中國移動:5G網(wǎng)絡AI應用典型場景技術解決方案白皮書
》
2、回復“
5G6G
”免費領取《
5G_6G毫米波測試技術白皮書-2022_03-21
》
3、回復“
YD6G
”免費領取《
中國移動:6G至簡無線接入網(wǎng)白皮書
》
4、回復“
LTBPS
”免費領取《
《中國聯(lián)通5G終端白皮書》
》
5、回復“
ZGDX
”免費領取《
中國電信5G NTN技術白皮書
》
6、回復“
TXSB
”免費領取《
通信設備安裝工程施工工藝圖解
》
7、回復“
YDSL
”免費領取《
中國移動算力并網(wǎng)白皮書
》
8、回復“
5GX3
”免費領取《
R16 23501-g60 5G的系統(tǒng)架構1
》
對本帖內容的看法?
我要點評
作者的更多帖子
PSS/SSS,PRACH發(fā)射時候是否有mimo,多天線怎樣使用?
2013-11-12
phich的配置
2013-05-15
lte中分集接收是怎么做的
2013-02-19
dmrs 和 資源分配的關系
2013-01-12
tdd UL/DL干擾的解決方法
2012-12-13
關于lte的波束賦型,預編碼
2012-10-24
[
充值威望,立即自動到帳
] [
VIP貴賓權限+威望套餐
] 另有大量優(yōu)惠贈送活動,請光臨充值中心
充值擁有大量的威望和最高的下載權限,下載站內資料無憂
horizon2
VIP會員
發(fā)短消息
關注Ta
積分 28229
帖子 1102
威望 19312 個
禮品券 66 個
專家指數(shù) -399
注冊 2007-5-5
專業(yè)方向 無線
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#2
大
中
小
使用道具
發(fā)表于 2009-10-31 22:06:57
技術問題,回答得專家指數(shù),快速升級
這個論壇沒有辦法查看發(fā)的帖子的閱讀量嗎
在線,17小時前提問
微信號綁定錯誤怎么辦
在線,24天前提問
這個紙質版,怎么買啊
在線,31天前提問
聯(lián)通的手機不能訪問論壇,解釋論壇的地址是加拿大地.
在線,49天前提問
有沒有做基站覆蓋仿真的軟件?
在線,77天前提問
技術創(chuàng)新與市場策略的調整,將成為決定企業(yè)能否在全.
在線,81天前提問
終端熄屏進入 Idle 態(tài)?
在線,90天前提問
有些資料能幫忙找嗎
在線,109天前提問
大陸版谷歌打不開,有什么辦法嘛
在線,115天前提問
華為GSC高級和網(wǎng)優(yōu)高級有什么區(qū)別
在線,125天前提問
請問客服在嗎?
在線,141天前提問
信號好,volte通話雜音可能原因
在線,170天前提問
有幾個月了。
在線,178天前提問
為什么訪問你的論壇老出這個無訪問登
在線,178天前提問
怎樣解綁微信?
在線,212天前提問
數(shù)通有哪些產(chǎn)品
在線,231天前提問
英文的,估計下載了也不會看!
對本帖內容的看法?
我要點評
[
立即成為VIP會員,百萬通信專業(yè)資料立即下載,支付寶、微信付款,簡單、快速!
]
bc6292002
金牌會員
發(fā)短消息
關注Ta
積分 8966
帖子 1468
威望 1099 個
禮品券 0 個
專家指數(shù) 243
注冊 2006-7-20
專業(yè)方向 移動通信 無線 室分
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#3
大
中
小
使用道具
發(fā)表于 2009-11-01 00:19:26
收藏了先
看不看日后再說
對本帖內容的看法?
我要點評
最新通信職位:
廣東通信人才網(wǎng)
|
北京通信人才網(wǎng)
|
上海通信人才網(wǎng)
|
南京通信人才網(wǎng)
|
西安通信人才網(wǎng)
|
重慶通信人才網(wǎng)
|
中國通信人才網(wǎng)
bc6292002
金牌會員
發(fā)短消息
關注Ta
積分 8966
帖子 1468
威望 1099 個
禮品券 0 個
專家指數(shù) 243
注冊 2006-7-20
專業(yè)方向 移動通信 無線 室分
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#4
大
中
小
使用道具
發(fā)表于 2009-11-01 00:20:47
謝謝分享啊
對本帖內容的看法?
我要點評
熱點:
通信招聘職位
|
網(wǎng)絡優(yōu)化全集
|
WCDMA精品
|
TD-SCDMA學習資料
|
EVDO
|
MGW媒體網(wǎng)關資料
3198
金牌會員
發(fā)短消息
關注Ta
積分 6545
帖子 497
威望 55299 個
禮品券 33 個
專家指數(shù) -3
注冊 2008-4-30
專業(yè)方向 無線網(wǎng)絡優(yōu)化
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#5
大
中
小
使用道具
發(fā)表于 2009-11-01 01:36:00
先下了再說 謝謝啦
對本帖內容的看法?
我要點評
最新通信職位:
廣東通信人才網(wǎng)
|
北京通信人才網(wǎng)
|
上海通信人才網(wǎng)
|
南京通信人才網(wǎng)
|
西安通信人才網(wǎng)
|
重慶通信人才網(wǎng)
|
中國通信人才網(wǎng)
我這三年
高級會員
發(fā)短消息
關注Ta
積分 1672
帖子 339
威望 59 個
禮品券 20 個
專家指數(shù) -23
注冊 2009-10-12
專業(yè)方向 移動通信
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#6
大
中
小
使用道具
發(fā)表于 2009-11-01 02:51:19
那倒是,收藏了不廢啥事,好歹充個門面
對本帖內容的看法?
我要點評
[
2分鐘擁有VIP權限和充足威望,可下載站內任何資料
] [
快速找到一份高薪的通信行業(yè)職位
]
960679634
鉆石會員
發(fā)短消息
關注Ta
積分 12147
帖子 1805
威望 58466 個
禮品券 5 個
專家指數(shù) 61
注冊 2009-7-17
專業(yè)方向 民工
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#7
大
中
小
使用道具
發(fā)表于 2009-11-02 14:14:48
樓主的目錄把俺看暈啦
對本帖內容的看法?
我要點評
熱點:
通信招聘職位
|
網(wǎng)絡優(yōu)化全集
|
WCDMA精品
|
TD-SCDMA學習資料
|
EVDO
|
MGW媒體網(wǎng)關資料
韭菜餡月餅
入門會員
發(fā)短消息
關注Ta
積分 25
帖子 5
威望 26 個
禮品券 0 個
專家指數(shù) 0
注冊 2015-9-28
專業(yè)方向 網(wǎng)絡優(yōu)化
回答問題數(shù)
0
回答被采納數(shù)
0
回答采納率
0%
#8
大
中
小
使用道具
發(fā)表于 2015-09-29 22:42:57
我也是看看目錄就醉了,不過值得下載!
對本帖內容的看法?
我要點評
熱點:
通信招聘職位
|
網(wǎng)絡優(yōu)化全集
|
WCDMA精品
|
TD-SCDMA學習資料
|
EVDO
|
MGW媒體網(wǎng)關資料
討論帖
資料帖
投票帖
懸賞帖
快速回復主題
標題
內容
上傳資料請點左側【添加附件】
(勾選中文件為要刪除文件)
[移動通信的安全性].Security.of.Mobile.Communications.pdf
您即將訪問其它網(wǎng)站
關閉
您即將訪問的地址是其它網(wǎng)站的內容,MSCBSC將不再對其安全性和可靠性負責,請自行判斷是否繼續(xù)前往
繼續(xù)訪問
取消訪問,關閉
當前時區(qū) GMT+8, 現(xiàn)在時間是 2025-01-11 10:52:22
渝ICP備11001752號
Copyright @ 2006-2016 mscbsc.com
本站統(tǒng)一服務郵箱:mscbsc@163.com
Processed in 0.681312 second(s), 27 queries , Gzip enabled
TOP
清除 Cookies
-
聯(lián)系我們
-
移動通信網(wǎng)
-
移動通信論壇
-
通信招聘網(wǎng)
-
Archiver