MSCBSC 移動通信論壇
搜索
登錄注冊
網(wǎng)絡優(yōu)化工程師招聘專欄 4G/LTE通信工程師最新職位列表 通信實習生/應屆生招聘職位

  • 閱讀:7103
  • 回復:7
移動通信安全的權威著作。不要失之交臂,趕快收藏起來吧,朋友們
bigfool
中級會員



 發(fā)短消息    關注Ta 

積分 922
帖子 206
威望 4214 個
禮品券 18 個
專家指數(shù) -108
注冊 2009-10-9
專業(yè)方向  手機軟件
回答問題數(shù) 0
回答被采納數(shù) 0
回答采納率 0%
 
發(fā)表于 2009-10-31 21:43:02  只看樓主 
【資料名稱】:移動通信的安全性

【資料作者】:Noureddine Boudriga

【資料日期】:2009

【資料語言】:英文

【資料格式】:PDF

【資料目錄和簡介】:

Preface.......................................................................................................... xxv
Acknowledgments.......................................................................................xxxi
About the Author..................................................................................... xxxiii
Section I Basic Techniques for Mobi le
Communic ations and Security
1. Threats, Hacking, and Viruses in Mobile Communications...................3
1.1 Introduction to Mobile Communications...........................................3
1.1.1 Security and Privacy in Mobile Communications..................5
1.1.2 Basic Security Requirements..................................................6
1.1.2.1 End User Perspective.............................................6
1.1.2.2 Communication Provider Perspective....................7
1.1.2.3 For Governments...................................................7
1.2 Basics of Mobile Communications.....................................................8
1.2.1 Infrastructure-Based Wireless Networks................................9
1.2.1.1 Cellular Network Security...................................10
1.2.1.2 WLAN Security..................................................10
1.2.1.3 Virtual Private Networks.....................................11
1.2.1.4 Mobile IP............................................................11
1.2.2 Infrastructureless Networks.................................................12
1.2.2.1 Distributing Encryption Keys in
Infrastructureless Wireless Networks...................13
1.2.2.2 Routing Security in Infrastructureless
Wireless Networks...............................................14
1.2.3 Heterogeneous Wireless Networks.......................................15
1.3 Wireless Vulnerabilities and Threats.................................................17
1.3.1 WLAN Vulnerabilities and Threats.....................................18
1.3.2 Cellular System Vulnerabilities and Threats.........................18
1.3.3 Application-Based Threats...................................................19
viii  Contents
1.3.3.1 Content-Based Threats.........................................19
1.3.3.2 Mixed Application...............................................20
1.4 Attacks in Mobile Environments......................................................21
1.4.1 Typical Attacks....................................................................21
1.4.1.1 Class of Illicit Use Attacks...................................21
1.4.1.2 Wireless Spoofing................................................22
1.4.1.3 Man-in-the-Middle Attacks.................................22
1.4.1.4 Denial of Service Attacks.....................................22
1.4.2 Distributed DoS Attacks in Mobile Communications.........24
1.4.2.1 Targeted Environments.......................................25
1.4.2.2 Defending against DDoS Attacks........................26
1.5 Mobile Malware...............................................................................27
1.5.1 Basics on Malware...............................................................27
1.5.2 Examples of Mobile Malware..............................................30
1.6 Prevention Techniques in Mobile Systems........................................32
1.6.1 Firewall in Mobile Communication....................................32
1.6.2 Encryption-Based Mechanisms for Prevention................... 34
1.6.2.1 WLAN Authentication Flaws..............................35
1.6.2.2 Wireless Ad Hoc Authentication Flaws................36
1.6.2.3 Cellular Authentication Flaws.............................37
1.7 Intrusion Detection in Wireless Communications............................38
1.7.1 Wireless Detection Approaches...........................................39
1.7.1.1 Mobile Profiles Construction...............................39
1.7.1.2 Monitoring Wireless Devices...............................39
1.7.1.3 Radio Frequency Fingerprinting (RFF).............. 40
1.7.2 Cluster-Based Detection in Ad Hoc Networks....................41
References.................................................................................................. 42
2. Access Control and Authentication in Mobile Communications..........45
2.1 Wireless System Security..................................................................45
2.2 Cryptography Basics........................................................................ 46
2.2.1 Symmetric Cryptography....................................................47
2.2.1.1 Classification of Symmetric Cryptosystems.........48
2.2.1.2 Encrypting with AES..........................................49
2.2.2 Asymmetric Cryptography..................................................51
2.2.2.1 Encrypting with RSA..........................................53
2.2.2.2 Encrypting with ElGamel....................................54
2.2.3 Symmetric vs. Asymmetric Cryptography...........................55
2.3 Insecurity of Cryptosystems.............................................................56
2.3.1 Insecurity of Secret Cryptosystems......................................56
2.3.2 Insecurity of Public Cryptosystems.....................................57
2.3.2.1 Attacks Based on Small Private Keys...................57
2.3.2.2 Attacks Based on Small Public Exponents...........58
Contents  ix
2.3.2.3 Cycling Attacks...................................................58
2.3.2.4 Message Concealing............................................58
2.4 Digital Signature..............................................................................59
2.4.1 The RSA Signature Scheme.................................................60
2.4.2 The DSA Signature Scheme.................................................61
2.4.3 Message Digest....................................................................62
2.5 Authentication..................................................................................63
2.5.1 Weak Authentication Schemes.............................................65
2.5.1.1 Password-Based Authentication...........................65
2.5.1.2 PIN-Based Authentication...................................67
2.5.2 Strong Authentication Schemes...........................................67
2.6 Attacks against Authentication in Mobile Wireless Networks..........72
2.6.1 Common Attacks................................................................72
2.6.2 Common Guidelines for Protection.....................................74
2.7 Authorization and Access Control in Mobile Communication.........75
2.7.1 Access Control.....................................................................75
2.7.2 Certificate-Based Authorization.......................................... 77
2.8 Key Distribution and Management..................................................80
2.8.1 Beller-Yacobi Protocol..........................................................80
2.8.2 Aziz-Diffie’s Protocol...........................................................81
2.8.3 ASPeCT Protocol................................................................82
References...................................................................................................83
3. Common Techniques for Mobile Communications Security................85
3.1 Introduction.....................................................................................85
3.2 Securing Network Protocols.............................................................86
3.2.1 IPsec Processing...................................................................87
3.2.1.1 Outgoing Traffic Processing................................88
3.2.1.2 Incoming Traffic Management........................... 90
3.2.2 IPsec Limitations.................................................................91
3.2.2.1 Limitations of Expressive Power..........................92
3.2.2.2 Limitations of Application Control......................92
3.2.2.3 Limitations of the Authorization Procedures.......92
3.2.2.4 Limitations of the SAD and SPD Protection.......93
3.2.2.5 Application-Specific Security Solutions...............93
3.3 Attacks on IPsec...............................................................................94
3.3.1 Destination Address Rewriting-Based Attack......................94
3.3.2 Attacks Based on IP Options Processing.............................96
3.3.3 Attacks Based on Protocol Field Manipulation....................96
3.3.4 Proposal Attack...................................................................96
3.3.5 Oracle ESP Padding Attack.................................................97
3.4 Transport Protocols Security............................................................98
x  Contents
3.4.1 SSL/TLS Features...............................................................98
3.4.2 Security Limitations of SSL/TLS.......................................101
3.4.3 WTLS...............................................................................102
3.4.3.1 Record Protocol.................................................102
3.4.3.2 Change Cipher Spec Protocol............................103
3.4.3.3 Alert Protocol....................................................103
3.4.3.4 Handshake Protocol..........................................104
3.4.4 Security Features of WTLS...............................................105
3.4.4.1 Authentication...................................................105
3.4.4.2 Data Integrity....................................................106
3.4.5 SSH...................................................................................107
3.5 Attacks against Transport Security Services....................................109
3.5.1 Attacks against SSL and TLS............................................109
3.5.1.1 Cipher Suite Rollback Attack............................. 110
3.5.1.2 Dropping Change Cipher Specification
Messages............................................................ 110
3.5.1.3 Key-Exchange Algorithm Rollback Attack........ 110
3.5.2 Attacks against WTLS...................................................... 111
3.5.2.1 Predictable IVs................................................... 111
3.5.2.2 35-Bit DES Encryption.....................................112
3.5.2.3 Unauthenticated Alert Messages........................112
3.6 Public Key Infrastructure...............................................................112
3.6.1 PKI Components...............................................................113
3.6.1.1 End Entity.........................................................113
3.6.1.2 Public Key Certificate (PKC, or just
Certificate)......................................................... 114
3.6.1.3 Certification Authority (CA)............................. 114
3.6.1.4 Certificate Repository (CR)............................... 115
3.6.1.5 Certificate Revocation List (CRL) Issuer........... 115
3.6.1.6 Registration Authority (RA).............................. 115
3.6.2 PKI Functions................................................................... 116
3.6.2.1 Registration....................................................... 116
3.6.2.2 Initialization...................................................... 117
3.6.2.3 Certificate Generation....................................... 117
3.6.2.4 Certificate Update............................................. 118
3.6.2.5 Revocation......................................................... 118
3.6.2.6 Key Pair Management....................................... 118
3.6.2.7 Cross-Certification............................................ 119
3.6.3 Wireless PKI...................................................................... 119
3.6.3.1 WPKI Requirements.........................................120
3.6.3.2 An Example of WPKI Architecture...................121
References.................................................................................................125
Contents  xi
4. Smart Card Security: The SIM/USIM Case........................................127
4.1 Introduction...................................................................................127
4.2 Basic on Smart Cards.....................................................................129
4.2.1 Components of a Smart Card............................................130
4.2.2 Smart Card Applications...................................................132
4.2.3 Security of Smart Cards....................................................135
4.3 Smart Card and Communication...................................................136
4.3.1 Communication with the Terminal...................................136
4.3.2 Subscriber Identity Module...............................................138
4.3.3 The Smart Card in UMTS................................................139
4.4 Attacks against Smart Cards...........................................................140
4.4.1 Invasive Attack Techniques................................................140
4.4.1.1 Removing the Chip from the Card Attacks.......141
4.4.1.2 Reverse Engineering Attacks on the Chipset.....141
4.4.1.3 Microprobing Attack.........................................141
4.4.1.4 Semi-Invasive Attacks........................................142
4.4.2 Non-Invasive Attacks.........................................................142
4.4.2.1 Differential Fault Analysis (DFA)......................145
4.4.2.2 Data Remanence...............................................146
4.5 Security of Log Files in Smart Cards..............................................147
4.5.1 Modeling the Log File Manager in Smart Cards...............148
4.5.1.1 The Threat Model..............................................148
4.5.1.2 The Event Model...............................................149
4.5.1.3 The Entity Model..............................................150
4.5.2 Secure Logs in Untrusted Environment.............................150
4.5.2.1 First Scenario..................................................... 152
4.5.2.2 Second Scenario................................................ 153
4.5.2.3 Third Scenario...................................................154
4.5.3 Partitioning Attack............................................................154
4.6 Forensics and SIM/USIM Cards....................................................156
4.6.1 SIM Card Investigation..................................................... 157
4.6.2 SIM Card Files Investigation............................................. 159
References................................................................................................. 161
Section II Attack and Protection Techniques
in Mobi le Communic ation Networks
5. Security of GSM Networks..................................................................165
5.1 Introduction...................................................................................165
5.2 GSM Mobility Scheme...................................................................166
5.2.1 GSM Infrastructure...........................................................166
5.2.1.1 The Mobile Station (MS)...................................166
5.2.1.2 The Base Station Subsystem (BSS).....................168
xii  Contents
5.2.1.3 Mobile Services Switching Center (MSC).........168
5.2.1.4 The Operation and Support System (OMC)......168
5.2.1.5 Home Location Register (HLR)........................168
5.2.1.6 Visitor Location Register (VLR)........................168
5.2.1.7 Authentication Center (AuC)............................169
5.2.1.8 Equipment Identity Register (EIR)....................169
5.2.2 Mobility Management.......................................................169
5.2.3 Protocol Architecture.........................................................171
5.2.3.1 Physical Layer....................................................171
5.2.3.2 Data Link Layer................................................172
5.2.3.3 Message Layer....................................................172
5.3 GSM Security Model......................................................................173
5.3.1 Security Requirements....................................................... 174
5.3.1.1 Protection of Call-Setup Information and
Communication Services................................... 174
5.3.1.2 Privacy of User-Location, Calling Patterns,
and User-Data................................................... 174
5.3.1.3 Replication and Clone Resistant Design............175
5.3.1.4 Equipment Identifiers........................................175
5.3.2 GSM Security Model.........................................................175
5.3.2.1 Anonymity........................................................176
5.3.2.2 Authentication...................................................177
5.3.2.3 Confidentiality..................................................178
5.4 Basic Attacks on GSM....................................................................179
5.4.1 GSM Security Flaws..........................................................179
5.4.2 Impersonation Attacks.......................................................180
5.4.3 Attacks against Anonymity................................................181
5.4.3.1 Passive Monitoring............................................181
5.4.3.2 Active Monitoring.............................................182
5.4.4 Attacks on the Authentication Algorithm..........................183
5.4.4.1 Cloning Based on Physical Access to the SIM.... 184
5.4.4.2 Cloning Attacks over the Air.............................185
5.5 GSM Encryption Algorithms.........................................................186
5.5.1 Algorithm A5/2.................................................................187
5.5.2 Algorithm A5/1.................................................................189
5.6 Advanced Attacks on GSM............................................................190
5.6.1 Attacks against Confidentiality.........................................190
5.6.1.1 Brute-Force Attacks........................................... 191
5.6.1.2 Cryptanalysis-Based Attacks on A5/1................192
5.6.2 Cryptanalysis Attacks on A5/2..........................................193
5.6.2.1 Using A5/2 Cryptanalysis to Target the
Confidentiality of A5/1 and A5/3......................193
5.6.2.2 The Known Plaintext Attack.............................195
Contents  xiii
5.6.3 Denial of Service Attacks...................................................196
5.6.3.1 Physical Intervention-Based Denial of
Service Attacks..................................................196
5.6.3.2 Logical Intervention-Based Denial of Service
Attacks..............................................................197
5.7 Improving GSM Security...............................................................197
5.7.1 Improving Authentication Protection................................198
5.7.2 Other Improvements.........................................................199
5.7.2.1 GSM—Newer A3/A8 Implementation..............199
5.7.2.2 GSM—A5/3 Ciphering.................................... 200
5.7.2.3 Protecting against Distributed DoS Attacks..... 200
References.................................................................................................202
6. Security of 3G Networks.....................................................................203
6.1 Introduction...................................................................................203
6.1.1 Security Challenges...........................................................205
6.1.2 Security Threats................................................................ 206
6.1.3 Retention of 2G Robust Features.......................................207
6.2 The 3G Networks.......................................................................... 208
6.2.1 Network Architecture....................................................... 208
6.2.1.1 The Mobile Station (MS)...................................209
6.2.1.2 The Access Network (UTRAN)........................210
6.2.1.3 The Core Network (CN)................................... 211
6.2.2 UMTS Security Architecture............................................213
6.3 Network Access Security................................................................214
6.3.1 User Identity Confidentiality.............................................214
6.3.2 Authentication and Key Agreement...................................216
6.3.3 Data Confidentiality and Integrity Protection of
Signaling Messages............................................................219
6.4 Network Domain Security............................................................ 220
6.4.1 IP-Based Protocol..............................................................221
6.4.2 SS7-Based Protocols...........................................................221
6.4.3 Traditional Network Security Features............................. 222
6.5 User, Application, and Visibility Domain Security.........................224
6.5.1 Application Domain Security............................................224
6.5.2 Security of Visibility and Configurability Domain............225
6.6 Security Functions......................................................................... 226
6.6.1 Integrity and Confidentiality Algorithms......................... 226
6.6.2 The KASUMI Block Cipher............................................. 228
6.7 Security Features of 3G Networks..................................................229
6.7.1 Mitigating 2G Weaknesses................................................229
6.7.1.1 Denial of Service...............................................229
6.7.1.2 Identity Catching..............................................230
xiv  Contents
6.7.1.3 Impersonation of the Network Attacks..............230
6.7.1.4 Eavesdropping on User Data.............................232
6.7.1.5 Attacks Aiming at the Impersonation of the
User...................................................................233
6.7.2 New Security Features and the Security of New Service... 234
6.8 Attacks on 3G Networks................................................................235
6.8.1 Classification of Attacks on 3G Networks.........................237
6.8.2 Examples of Attacks..........................................................239
6.8.2.1 Attacks Targeting the Call Forwarding
Service...............................................................239
6.8.2.2 Attacks Targeting the Client Billing Service......240
6.8.2.3 Attacks Targeting the Location Based
Instant Message System.....................................241
References.................................................................................................242

中間章節(jié)目錄不列在這兒啦,要不超過內容太多,超過上傳字數(shù)限制了。

References................................................................................................ 564
15. Security of Multimedia Communications...........................................567
15.1 Introduction...................................................................................567
15.2 Transmission Issues of Mobile Multimedia.....................................571
15.2.1 Transport Error Protection................................................571
15.2.2 Congestion Control for Multimedia..................................573
15.2.3 QoS Control of Mobile Multimedia..................................574
15.3 Securing Copyright in Mobile Networks........................................576
15.3.1 Copyright Requirements...................................................576
15.3.2 Watermarking...................................................................578
15.3.3 Digital Fingerprinting.......................................................580
15.4 Major Watermarking Techniques...................................................583
15.4.1 Image Watermarks............................................................583
15.4.1.1 Least Significant Bit Modification (LSB)...........584
15.4.1.2 Correlation-Based Techniques...........................584
15.4.1.3 Frequency Domain Watermarks........................585
15.4.2 Video Watermarking.........................................................587
15.5 Attacks against Mobile Multimedia................................................589
15.5.1 Attack Classification..........................................................589
15.5.2 Attacks Targeting Fingerprinting Schemes........................591
Contents  xxiii
15.5.2.1 Single-User Attacks...........................................591
15.5.2.2 Multimedia Collusion Attacks...........................592
15.5.3 Attacks Targeting Watermarking Schemes........................593
15.5.3.1 Synchronization Attacks....................................593
15.5.3.2 StirMark Attack.................................................594
15.5.3.3 Unauthorized Embedding Attacks.....................594
15.5.3.4 Scrambling Attacks............................................595
15.5.3.5 Unauthorized Removal......................................595
15.6 Countermeasures against Watermarking Attacks...........................595
15.6.1 General Rules....................................................................596
15.6.2 Countermeasures against Collusion Attacks......................596
15.6.3 Countermeasures against Ambiguity Attacks....................596
15.6.4 Countermeasures against Embedding Attacks...................597
15.6.5 Use of Attack-Resilient Block-Based Watermark
Decoder.............................................................................597
15.6.6 Preventing Unauthorized Detection..................................599
15.7 Security of Mobile Multimedia Multicasting Schemes...................599
15.7.1 Securing Multicasting Schemes.........................................599
15.7.2 Authentication of Multimedia Content.............................601
References.................................................................................................602
Index............................................................................................................605

查看積分策略說明
附件下載列表:
2009-10-31 21:43:02  下載次數(shù): 30
[移動通信的安全性].Security.of.Mobile.Communications.pdf (5.34 MB)
掃碼關注5G通信官方公眾號,免費領取以下5G精品資料
  • 1、回復“YD5GAI”免費領取《中國移動:5G網(wǎng)絡AI應用典型場景技術解決方案白皮書
  • 2、回復“5G6G”免費領取《5G_6G毫米波測試技術白皮書-2022_03-21
  • 3、回復“YD6G”免費領取《中國移動:6G至簡無線接入網(wǎng)白皮書
  • 4、回復“LTBPS”免費領取《《中國聯(lián)通5G終端白皮書》
  • 5、回復“ZGDX”免費領取《中國電信5G NTN技術白皮書
  • 6、回復“TXSB”免費領取《通信設備安裝工程施工工藝圖解
  • 7、回復“YDSL”免費領取《中國移動算力并網(wǎng)白皮書
  • 8、回復“5GX3”免費領取《 R16 23501-g60 5G的系統(tǒng)架構1
  • 對本帖內容的看法? 我要點評

     
    [充值威望,立即自動到帳] [VIP貴賓權限+威望套餐] 另有大量優(yōu)惠贈送活動,請光臨充值中心
    充值擁有大量的威望和最高的下載權限,下載站內資料無憂
    horizon2
    VIP會員
    鎵嬫満鍙風爜宸查獙璇? style=


     發(fā)短消息    關注Ta 

    積分 28229
    帖子 1102
    威望 19312 個
    禮品券 66 個
    專家指數(shù) -399
    注冊 2007-5-5
    專業(yè)方向  無線
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2009-10-31 22:06:57 
    英文的,估計下載了也不會看!

    對本帖內容的看法? 我要點評

     
    [立即成為VIP會員,百萬通信專業(yè)資料立即下載,支付寶、微信付款,簡單、快速!]
    bc6292002
    金牌會員



     發(fā)短消息    關注Ta 

    積分 8966
    帖子 1468
    威望 1099 個
    禮品券 0 個
    專家指數(shù) 243
    注冊 2006-7-20
    專業(yè)方向  移動通信 無線 室分
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2009-11-01 00:19:26  QQ
    收藏了先

    看不看日后再說

    對本帖內容的看法? 我要點評

     
    最新通信職位:廣東通信人才網(wǎng) | 北京通信人才網(wǎng) | 上海通信人才網(wǎng) | 南京通信人才網(wǎng) | 西安通信人才網(wǎng) | 重慶通信人才網(wǎng) | 中國通信人才網(wǎng)
    bc6292002
    金牌會員



     發(fā)短消息    關注Ta 

    積分 8966
    帖子 1468
    威望 1099 個
    禮品券 0 個
    專家指數(shù) 243
    注冊 2006-7-20
    專業(yè)方向  移動通信 無線 室分
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2009-11-01 00:20:47  QQ
    謝謝分享啊

    對本帖內容的看法? 我要點評

     
    熱點: 通信招聘職位 | 網(wǎng)絡優(yōu)化全集 | WCDMA精品 | TD-SCDMA學習資料 | EVDO | MGW媒體網(wǎng)關資料
    3198
    金牌會員
    鎵嬫満鍙風爜宸查獙璇? style=


     發(fā)短消息    關注Ta 

    積分 6545
    帖子 497
    威望 55299 個
    禮品券 33 個
    專家指數(shù) -3
    注冊 2008-4-30
    專業(yè)方向  無線網(wǎng)絡優(yōu)化
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2009-11-01 01:36:00  QQ
    先下了再說 謝謝啦

    對本帖內容的看法? 我要點評

     
    最新通信職位:廣東通信人才網(wǎng) | 北京通信人才網(wǎng) | 上海通信人才網(wǎng) | 南京通信人才網(wǎng) | 西安通信人才網(wǎng) | 重慶通信人才網(wǎng) | 中國通信人才網(wǎng)
    我這三年
    高級會員
    鎵嬫満鍙風爜宸查獙璇? style=


     發(fā)短消息    關注Ta 

    積分 1672
    帖子 339
    威望 59 個
    禮品券 20 個
    專家指數(shù) -23
    注冊 2009-10-12
    專業(yè)方向  移動通信
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2009-11-01 02:51:19 
    那倒是,收藏了不廢啥事,好歹充個門面

    對本帖內容的看法? 我要點評

     
    [2分鐘擁有VIP權限和充足威望,可下載站內任何資料] [快速找到一份高薪的通信行業(yè)職位]
    960679634
    鉆石會員
    鎵嬫満鍙風爜宸查獙璇? style=


     發(fā)短消息    關注Ta 

    公益·慈善勛章  
    積分 12147
    帖子 1805
    威望 58466 個
    禮品券 5 個
    專家指數(shù) 61
    注冊 2009-7-17
    專業(yè)方向  民工
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2009-11-02 14:14:48 
    樓主的目錄把俺看暈啦

    對本帖內容的看法? 我要點評

     
    熱點: 通信招聘職位 | 網(wǎng)絡優(yōu)化全集 | WCDMA精品 | TD-SCDMA學習資料 | EVDO | MGW媒體網(wǎng)關資料
    韭菜餡月餅
    入門會員
    鎵嬫満鍙風爜宸查獙璇? style=


     發(fā)短消息    關注Ta 

    積分 25
    帖子 5
    威望 26 個
    禮品券 0 個
    專家指數(shù) 0
    注冊 2015-9-28
    專業(yè)方向  網(wǎng)絡優(yōu)化
    回答問題數(shù) 0
    回答被采納數(shù) 0
    回答采納率 0%
     
    發(fā)表于 2015-09-29 22:42:57 
    我也是看看目錄就醉了,不過值得下載!

    對本帖內容的看法? 我要點評

     
    熱點: 通信招聘職位 | 網(wǎng)絡優(yōu)化全集 | WCDMA精品 | TD-SCDMA學習資料 | EVDO | MGW媒體網(wǎng)關資料

    快速回復主題    
    標題
    內容
     上傳資料請點左側【添加附件】

    (勾選中文件為要刪除文件)


    當前時區(qū) GMT+8, 現(xiàn)在時間是 2025-01-11 10:52:22
    渝ICP備11001752號  Copyright @ 2006-2016 mscbsc.com  本站統(tǒng)一服務郵箱:mscbsc@163.com

    Processed in 0.681312 second(s), 27 queries , Gzip enabled
    TOP
    清除 Cookies - 聯(lián)系我們 - 移動通信網(wǎng) - 移動通信論壇 - 通信招聘網(wǎng) - Archiver