当前位置:首页>正文

MCSE Windows 2000 Designing 考试指南(1CD) kindle 下载 网盘 pdf azw3 极速 rtf umd

免费下载书籍地址:PDF下载地址

精美图片

MCSE Windows 2000 Designing 考试指南(1CD)书籍详细信息

  • ISBN:9787505370180
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2002-02
  • 页数:暂无页数
  • 价格:66.00
  • 纸张:暂无纸张
  • 装帧:暂无装帧
  • 开本:暂无开本
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分

内容简介:

本书是美国著名的出版商McGraw-Hill出版的畅销认证系列丛书All-in-One中的一本。本书包含现行的MCSE Windows 2000 Designing核心考试的全部内容,即Directory Services Infrastructure、Network Infrastructure和Network Security三门Designing(设计)考试。作者在本书中提供了极具洞察力的专家经验,每一章都包括详细的考试目标、实践问题和实用练习,详细讲述了Windows的安装、配置和故障排除等方面的内容,光盘中包含大量原汁原味的考试试题、测试引擎和专题讲座视频片断。本书适合MCSE认证考试的备考者使用。

书籍目录:

Introduction 1

PartⅠ Exam 70-219: Designing a Microsoft Windows 2000

Directory Services Infrastructure 9

Chapter 1 Defining Directory Services 10

Common Understanding of Directory Services 10

Directory Services and Meta-Information 12

History and Types of Directory Services 12

Predicting the Future: Meta-Directories 14

Active Directory from the Top Down 15

Forests 15

Trees 16

Domains 16

Organizational Units 17

Lower-Level Objects 17

Data and Attributes 19

Sites 19

Directory Services in Different Versions of Windows 19

Top Reasons to Implement Windows 2000 and Active Directory 21

Top Reasons to Implement Windows 2000 21

Top Reasons to Implement Active Directory 26

Chapter Review 31

Questions 31

Answers 31

Key Skill Sets 31

Key Terms 31

Chapter 2 Analyzing Business Requirements 33

Analyzing the Existing and Planned Business Models 34

Analyzing the Company Model and the Geographical Scope 34

Analyzing Company Processes 41

Management 43

Company Organization 44

Vendor, Partner, and Customer Relationships 46

Acquisition Plans 46

Analyzing Factors That Influence Company Strategies 47

Identifying Company Priorities 47

Identifying the Projected Growth and Growth Strategy 48

Identifying Relevant Laws and Regulations 48

Identifying the Company誷 Tolerance for Risk 48

Identifying the Total Cost of Operations 48

Chapter Review 49

Questions 49

Answers 49

Key Skill Sets 49

Key Terms 49

Chapter 3 Analyzing Technical Requirements 50

Evaluating Existing and Planned Technical Environment 51

Analyzing Company Size and User and Resource Distribution 51

Assessing Available Connectivity 53

Assessing Net Available Bandwidth 55

Analyzing Performance Requirements 56

Analyzing Data- and System-Access Patterns 56

Analyzing Network Roles and Responsibilities 57

Analyzing Security Considerations 58

Analyzing the Impact of Active Directory 59

Assessing Existing Systems and Applications 59

Identifying Existing and Planned Upgrades and Rollouts 59

Analyzing the Technical Support Structure 59

Analyzing Existing and Planned Network and Systems Management 60

Analyzing the Business Requirements for Client-Desktop Management 61

Chapter Review 62

Questions 62

Answers 63

Key Skill Sets 63

Key Terms 63

Chapter 4 Designing a Directory Service Architecture 64

Designing an Active Directory Forest and Domain 65

Designing a Forest and Schema Structure 66

Designing a Domain Structure 69

Analyzing and Optimizing Trust Relationships 69

Designing an Active Directory Naming Strategy 71

Establishing the Scope of the Active Directory 72

Designing the Namespace 73

Planning DNS Strategy 74

Designing and Planning Organization Units 75

Developing an OU Delegation Plan 77

Planning Group Policy Object Management 78

Planning Policy Management for Client Computers 80

Planning for Coexistence 80

Designing an Active Directory Site Topology 81

Designing a Replication Strategy 81

Defining Site Boundaries 83

Designing a Schema Modification Policy 83

Designing an Active Directory Implementation Plan 85

Single-Domain Windows NT System 85

Single-Master-Domain Windows NT System 85

Multiple-Master-Domain Windows NT System 86

Complete-Trust-Domain Windows NT System 86

A New Windows 2000 Domain 87

Chapter Review 87

Questions 88

Answers 88

Key Skill Sets 88

Key Terms 89

Chapter 5 Designing Your Service Locations 90

Designing the Placement of Operations Masters 91

Understanding the Roles of Operations Masters 91

Schema Master 91

Domain Naming Master 93

Primary Domain Controller Emulator 93

Infrastructure Master 94

Relative Identifier Master 94

Role Placement 94

Permissions 95

Role Changing 95

Disaster Recovery 96

Designing the Placement of Global Catalog Servers 96

Global Catalog Servers 97

Global Catalog Server Placement Considerations 97

Designing the Placement of Domain Controller Servers 98

DNS Zone Planning 101

DNS Lookup Zones 102

DNS Zone Types 102

Where, Oh Where Should My DNS Go? 103

Designing the Placement of DNS Servers 103

Design 1 104

Design 2 105

Design 3 105

Design 4 105

Next Steps 105

Chapter Review 106

Questions 106

Answers 106

Key Skill Sets 107

Key Terms 107

PartⅡ Exam 70-220: Designing Security for a Microsoft

Windows 2000 109

Chapter 6 Introduction to Security 110

Intruder Perspectives 110

The Business Case 111

Technical Tangents of Networking and Security 112

User and Group Account Management 112

Machine Security 113

Network and Communication Security 113

Public Key Infrastructure (PKI) 116

The Security Life Cycle 117

Discovery 117

Design 117

Testing 117

Deployment 117

Evaluation 118

Final Steps-Feedback 118

Chapter Review 119

Questions 119

Answers 119

Key Skill Sets 119

Key Terms 120

Chapter 7 Analyzing Business and Technical Requirements 121

Defining Security in the Enterprise 122

Evaluating Business Factors That Affect Security Planning 123

Analyzing the Existing and Planned Business Models 124

Analyzing Business Factors That Influence Company Strategies 125

Evaluating Your Technology Options in Security Planning 129

Analyzing the Physical and Information-Security Models 130

Understanding the Logical Layout of Services and Applications 133

Understanding the People Factor in Security Planning 136

Analyzing Business and Security Requirements for the End User 137

Analyzing Network Roles and Responsibilities 137

Evaluating Specific Security Vulnerabilities 139

Lack of IT Staff Education 139

Ineffective, Incomplete, or Missing Corporate Security Policies 140

User Education 141

Proactive Anti-Hacking Measures 142

Disaster-Recovery Plan 143

Security Hotspots 144

Catywhompus Construction Updates 145

Chapter Review 145

Questions 146

Answers 146

Key Skill Sets 147

Key Terms 147

Additional Resources and Information 147

Chapter 8 Analyzing Security Requirements 149

Assessing Your Current Environment 149

Vulnerabilities 150

Creating a Baseline 153

Developing a Security Policy 155

Authenticating All User Access to System Resources 156

Applying Appropriate Access Control to All Resources 158

Establishing Appropriate Trust Relationships Between Multiple Domains 160

Enabling Data Protection for Sensitive Data 161

Setting Uniform Security Policies 161

Deploying Secure Applications 167

Managing Security Administration 168

Implementing Your Security Policy 168

Chapter Review 172

Questions 172

Answers 173

Key Skill Sets 173

Key Terms 174

Chapter 9 Designing a Windows 2000 Security Solution 175

Windows 2000 Security Policies 176

Audit Policies 176

Delegation of Authority 184

Policy Inheritance 189

Encrypting File System (EFS) 192

Design an Authentication Strategy 196

Authentication Methods 196

Security Group Strategy 203

Design a Public Key Infrastructure 204

Certificate Authority Hierarchies 204

Certificate Server Roles 205

Managing Certificates 208

Third-Party Certificate Authorities 212

Design Windows 2000 Network Services Security 214

DNS Security 214

Remote Installation Services (RIS) Security 215

SNMP Security 220

Terminal Services Security 223

Chapter Review 229

Questions 229

Answers 230

Key Skill Sets 230

Key Terms 231

Chapter 10 Designing a Security Solution for Access Between Networks 232

Accessing the Internet 232

Proxy Server 233

Firewall 233

Gateway 234

Internet Connection Server 234

Common Internet File System (CIFS) 236

IP Security (IPSec) 238

Windows 2000誷 Default IPSec Policies 239

Policy Configuration 240

Testing Your IPSec Configuration 249

Virtual Private Networks (VPNs) 249

The VPN Server 251

Installing a VPN Client 256

Lab Exercise 10.15: Install a VPN Client 256

Remote Access Service 258

Remote Access Authorization 262

Chapter Review 267

Questions 267

Answers 268

Key Skill Sets 268

Key Terms 268

Chapter 11 Designing Security for Communication Channels 269

Common Communication Channel Attacks 270

Designing a Signing Solution with the Server Message Block Protocol 272

SMB Signing Implementation 272

Designing IP Layer Security 273

Selecting IPSec Mode 274

Planning IPSec Protocol Usage 275

Using Predefined IPSec Policies 276

IPSec Implementation Components 278

Designing an IPSec Management Strategy 280

Defining Security Levels 280

Designing Negotiation Policies 281

Designing Security Policies and Policy Management 283

Designing IPSec Encryption 285

Designing IPSec Filters 285

IPSec Best Practices 286

Verifying IPSec Communications 287

Chapter Review 289

Questions 289

Answers 290

Key Skill Sets 290

Key Terms 291

PartⅢ Exam 70-221: Designing a Microsoft Windows 2000 Network Infrastructure 294

Chapter 12 Overview of Designing a Network Infrastructure 294

Windows 2000 Networking Services Design Overview 294

The Networking Services Deployment Cycle 297

Designing the Networking Services 298

Testing the Design 299

Implementing the Design 299

Managing the Network Services 300

Microsoft Windows 2000 Networking Services 300

Lab Exercise 12.1: Developing a Design Approach 301

The Network Foundation 302

Base Protocol Support-TCP/IP 303

Automated Client Configuration-DHCP 303

Resolving Host Names-DNS 304

Lab Exercise 12.2: Solving a Name Resolution Design Problem 305

Resolving NetBIOS Names-WINS 305

Designing Internet Connectivity 306

Network Address Translation-NAT 306

Microsoft Internet Security and Acceleration Server 307

Designing Routing and Remote-Access Connectivity 307

Remote Access 308

RADIUS and IAS 308

IP Routing 308

Putting It All Together: Integrating the Network Services Infrastructure 309

Creating Performance Monitor Log Files 310

Defining the Network Design Attributes 315

Chapter Review 316

Questions 316

Answers 317

Key Skill Sets 317

Key Terms 317

Chapter 13 Analyzing Business and Technical Requirements 318

Analyzing the Business 319

Analyzing the Geographical Scope and Existing and Planned Business Models 320

Analyzing Company Processes 323

Analyzing the Existing and Planned Organizational Structures 326

Analyzing Factors That Influence Company Strategies 329

Analyzing the IT Management Structure 332

Business Requirements Analysis Checklist 337

Evaluating the Company誷 Technical Requirements 337

Documenting the Existing Infrastructure Design 338

Analyzing Client Computer Access Requirements 345

Analyzing the Existing Disaster-Recovery Strategy 346

Directions 349

Business Background 349

Current System 350

IT Management Sample Interviews 350

Envisioned System 351

Case Study Questions: BTI Analysis 353

Chapter Review 353

Questions 354

Answers 354

Key Skill Sets 355

Key Terms 355

Chapter 14 Designing a Network Infrastructure Using TCP/IP 356

TCP/IP Background 357

TCP/IP Protocol Suite 358

TCP/IP Standards 358

TCP/IP Protocol Architecture 359

Key TCP/IP Design Considerations 361

Windows 2000 TCP/IP Features 362

Windows 2000 TCP/IP Services 362

Designing a Functional TCP/IP Solution 363

IP Addressing Review 363

Private Network IP Addressing 366

Subnet Requirements 368

IP Configuration Approaches 369

TCP/IP Design for Improving Availability 370

TCP/IP Design for Improving Performance 371

Optimizing IP Subnetting 371

Optimizing Traffic on an IP Network 373

Using QoS Mechanisms 374

TCP/IP Security Solutions 376

Packet Filtering Techniques 377

Data Encryption Design 377

IPSec Encryption Algorithms 378

IPSec Authentication Protocols 378

IPSec Internet Key Exchange 379

Chapter Review 384

Questions 384

Answers 385

Key Skill Sets 385

Key Terms 385

Chapter 15 Designing an Automated IP Configuration Solution Using DHCP 387

Key DHCP Features 388

Management Features 389

Enhanced Monitoring and Statistical Reporting 389

DNS and WINS Integration 389

Rogue DHCP Server Detection 390

User-Specific and Vendor-Specific Option Support 390

DHCP Server Clustering 390

Multicast IP Address Allocation 391

DHCP Client Support 391

Automatic Client Configuration 391

Local Storage 391

BOOTP Client Support 392

Combining DHCP with Other Services 392

Active Directory Integration 392

Dynamic Updates in the DNS Namespace 392

Routing and Remote Access Integration 393

DHCP Design Choices 394

Functional Aspects of Designing a DHCP Solution 394

Using DHCP Servers on the Network 395

Configuring and Selecting TCP/IP Options on the Network 395

Providing IP Configuration Management to BOOTP and Non-Microsoft Clients 396

DHCP Sample Design for a Single Subnet LAN 397

DHCP Example Design for a Large Enterprise Network 398

DHCP Example Design for a Routed Network 398

Relay Agent Deployment 399

DHCP and Routing and Remote Access 400

DHCP Server Placement 400

Creating a DHCP Solution to Ensure Service Availability 401

Distributed Scope Solution 401

Clustering Solution 402

Creating a DHCP Solution to Enhance Performance 402

Increasing Performance of Individual DHCP Servers 402

Increasing Performance by Adding DHCP Servers 405

Designing a Secure DHCP Solution 405

Preventing Unauthorized Windows 2000 Servers 405

Security Risks Using DHCP in DMZ Networks 406

Directions 407

Scenario 407

Design Requirements and Constraints 407

Envisioned System 407

Availability 408

Performance 408

Security 408

Proposed System 409

Chief Technology Officer誷 Comments 409

Case Study Questions 409

Chapter Review 411

Questions 411

Answers 412

Key Skill Sets 413

Key Terms 413

Chapter 16 Creating a DNS Name-Resolution Design 414

The Domain Name System Solution 415

New Features in the Windows 2000 Implementation of DNS 415

Resolution Improvements 416

Key Components of DNS 417

DNS Resolution Process 418

Resource Load-Sharing Control 419

Collecting Information for the DNS Design Decisions 421

Creating a Functional Windows 2000 DNS Strategy 421

DNS Zones and Zone Types 421

DNS Server Placement and Zone Type Considerations 425

Integrating DNS and WINS 427

Integrating with BIND and Windows NT 4.0 DNS Servers 428

Internet Access Considerations 434

Existing Namespace Integration Issues 435

Hands-On Section Exercises 435

Availability Considerations in Windows 2000 DNS Designs 436

Optimization Strategies in Windows 2000 DNS Designs 437

Server Capacity Optimization 437

Monitoring Server Performance 438

Query Resolution Optimization 441

Reducing the Impact of Server-to-Server Traffic on the Network 442

Security Strategies in DNS Designs 443

Secured Dynamic Update 443

Controlling Update Access to Zones 443

DNS Dynamic Updates from DHCP and Windows 2000 444

DNS Zone Replication 444

DNS in Screened Subnets 444

Hands-On Section Exercises 444

Chapter Review 452

Questions 452

Answers 452

Key Skill Sets 453

Key Terms 453

Chapter 17 Designing with WINS Services and DFS 454

The Microsoft WINS Solution 454

WINS Background 455

NetBIOS Name Resolution 456

Creating a WINS Design 460

Initial WINS Design Steps 460

Designing a Functional WINS Solution 461

Enhancing WINS Availability 467

Optimizing WINS Performance 469

Securing a WINS Solution 471

Designing a Distributed File System (DFS) Strategy 472

DFS Architecture 473

DFS Platform Compatibility 473

DFS Features 473

Key DFS Terms 475

Placing a DFS Root 475

DFS Root Replica Strategy for High Availability 476

Chapter Review 482

Questions 482

Answers 484

Key Skill Sets 484

Key Terms 484

Chapter 18 Designing Internet and Extranet Connectivity Solutions 485

Firewalls 486

Common Firewall Technologies 488

Firewall Placement 491

Demilitarized Zones or Screened Subnets 491

Routing and Remote Access 491

Windows 2000 Network Address Translation 492

Designing a Functional NAT Solution 493

Designing for NAT Availability and Performance 495

NAT Security Considerations 495

Outbound Internet Traffic 496

Inbound Internet Traffic 496

VPNs and Network Address Translators 496

Internet Connection Sharing 496

Web Caching with a Proxy Server 497

What Does a Proxy Server Do? 497

Protecting the Network 497

Microsoft Proxy Server 498

Designing a Functional Proxy Server Solution 499

Designing for Proxy Server Availability and Performance 500

Proxy Server Security Considerations 501

Comparing Internet-Connection Sharing Solutions 502

Scenario 503

Case Study Question 503

Chapter Review 504

Questions 504

Answers 505

Key Skill Sets 506

Key Terms 506

Chapter 19 Designing a Wide Area Network Infrastructure 507

Connecting Private Networks Using RRAS 508

Installing and Configuring RRAS 509

Routing for Connectivity Between Private Networks 515

Designing a Functional Routing Solution 517

Securing Private Network Connections 525

Optimizing a Router Design for Availability and Performance 526

RRAS Solutions Using Demand-Dial Routing 526

Designing Remote-User Connectivity 526

Designing a VPN Strategy 527

Designing Remote-Access Dial-Up Solutions 529

Designing a Dial-Up or VPN Solution in a Routed Network 529

Performance and Availability Design Considerations 529

Security Considerations 530

VPN Best Practices 531

Dial-Up Best Practices 532

Designing a Remote-Access Solution Using RADIUS 533

Integrating Authentication with RADIUS 534

Why Use IAS? 536

Designing a Functional RADIUS Solution 536

RADIUS Fault-Tolerance and Performance Solutions 536

Security Considerations for RADIUS 537

Chapter Review 539

Questions 539

Answers 540

Key Skill Sets 541

Key Terms 541

Chapter 20 Designing a Management and Implementation

Strategy for Windows 2000 Networking 543

Network Services Management Strategies 543

Identifying Management Processes 544

Monitoring the Network Services Status 545

Analyzing the Information 549

Reactive and Proactive Response Strategies 550

Combining Networking Services 550

Benefits of Combining Networking Services 550

Constraints on Combining Networking Services 550

Security Issues Related to Combining Services 551

Combining Networking Services That Are Cluster-Aware 551

Optimizing Performance by Combining Services 552

Chapter Review 553

Questions 553

Answers 554

Key Skill Sets 554

Key Terms 555

PartⅣ Bringing It All Together 557

Chapter 21 The Holistic Windows 2000 Design Process 558

Building Blocks 558

Active DirectoryActive Directory 558

Security 559

Network Infrastructure 559

Common Elements 559

Next Steps-Life as an MCSE 560

Chapter Review 561

PartⅤ Appendixes 563

Appendixes A More Case Study Analyses and Questions 564

Four Case Studies for Analysis 564

Exam Questions on the Topics Presented in this Book 586

Encrypting File System (Six Questions) 586

Auditing (Three Questions) 588

Public Key Infrastructure (11 Questions) 589

Internet Protocol Security (Six Questions) 594

Active Directory Services (27 Questions) 597

Appendixes B MCSE Certification Specifics 606

Microsoft誷 New Certification Track 606

Your Commitment to Getting Certified 607

Role of Real-World Experience 608

Opportunities for MCSEs 608

Compensation 609

Ongoing Certification Requirements 611

Life as an MCSE Professional 611

Work 612

Continuing Education 612

Conferences 612

User Groups 612

Certification Exam Objectives 612

Exam 70-210: Installing, Configuring, and Administering

Microsoft Windows 2000 Professional 613

Exam 70-215: Installing, Configuring, and Administering

Microsoft Windows 2000 Server 615

Exam 70-216: Implementing and Administering a Microsoft

Windows 2000 Network Infrastructure 617

Exam 70-217: Implementing and Administering a Microsoft

Windows 2000 Directory Services Infrastructure 620

Exam 70-219: Designing a Microsoft Windows 2000 Directory

Services Infrastructure 622

Exam 70-220: Designing Security for a Microsoft Windows 2000 Network 623

Exam 70-221: Designing a Microsoft Windows 2000 Network Infrastructure 625

Appendixes C Case Study Analysis Approach 629

Case Study Method 629

Management Value 630

How to Approach a Case 631

作者介绍:

暂无相关内容,正在全力查找中

出版社信息:

暂无出版社相关信息,正在全力查找中!

书籍摘录:

暂无相关书籍摘录,正在全力查找中!

在线阅读/听书/购买/PDF下载地址:

在线阅读地址:MCSE Windows 2000 Designing 考试指南(1CD)在线阅读

在线听书地址:MCSE Windows 2000 Designing 考试指南(1CD)在线收听

在线购买地址:MCSE Windows 2000 Designing 考试指南(1CD)在线购买

原文赏析:

暂无原文赏析,正在全力查找中!

其它内容:

暂无其它内容!

书籍真实打分

故事情节:4分

人物塑造:8分

主题深度:9分

文字风格:7分

语言运用:3分

文笔流畅:8分

思想传递:5分

知识深度:8分

知识广度:7分

实用性:4分

章节划分:3分

结构布局:9分

新颖与独特:7分

情感共鸣:6分

引人入胜:3分

现实相关:4分

沉浸感:6分

事实准确性:3分

文化贡献:3分

网站评分

书籍多样性:8分

书籍信息完全性:3分

网站更新速度:8分

使用便利性:4分

书籍清晰度:4分

书籍格式兼容性:6分

是否包含广告:6分

加载速度:6分

安全性:8分

稳定性:4分

搜索功能:9分

下载便捷性:3分

下载点评

  • 情节曲折(142+)
  • 无水印(104+)
  • 小说多(199+)
  • 种类多(601+)
  • 格式多(660+)
  • 微信读书(192+)
  • 三星好评(196+)

下载评价

网友 瞿***香:非常好就是加载有点儿慢。

网友 孙***美:加油!支持一下!不错,好用。大家可以去试一下哦

网友 焦***山:不错。。。。。

网友 田***珊:可以就是有些书搜不到

网友 冷***洁:不错,用着很方便

网友 饶***丽:下载方式特简单,一直点就好了。

网友 冉***兮:如果满分一百分,我愿意给你99分,剩下一分怕你骄傲

网友 苍***如:什么格式都有的呀。

网友 芮***枫:有点意思的网站,赞一个真心好好好 哈哈

网友 孔***旋:很好。顶一个希望越来越好,一直支持。

网友 蓬***之:好棒good

网友 訾***雰:下载速度很快,我选择的是epub格式

版权声明

1本文:MCSE Windows 2000 Designing 考试指南(1CD)转载请注明出处。
2本站内容除签约编辑原创以外,部分来源网络由互联网用户自发投稿仅供学习参考。
3文章观点仅代表原作者本人不代表本站立场,并不完全代表本站赞同其观点和对其真实性负责。
4文章版权归原作者所有,部分转载文章仅为传播更多信息服务用户,如信息标记有误请联系管理员。
5本站一律禁止以任何方式发布或转载任何违法违规的相关信息,如发现本站上有涉嫌侵权/违规及任何不妥的内容,请第一时间联系我们申诉反馈,经核实立即修正或删除。


本站仅提供信息存储空间服务,部分内容不拥有所有权,不承担相关法律责任。

相关文章:

  • 2019全国社会工作者职业水平考试真题详解与全真题库:社会工作法规与政策(中级 附考点精析) kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 高考英语小卷实战 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 中国人力资源服务业蓝皮书.2014 萧鸣政,李栋 主编 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 阿斗 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 实用胸部外科学 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 宋仁宗和他的帝国精英 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 孟子译注评 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 近现代物理实验 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 尧坝场 kindle 下载 网盘 pdf azw3 极速 rtf umd
  • 读通鉴论 kindle 下载 网盘 pdf azw3 极速 rtf umd